Remove Government Remove Information governance Remove Passwords Remove Security
article thumbnail

14 Ways to Create a Secure Password in 2019 (That you’ll Remember)

IG Guru

There is a mounting requirement to be able to create and safely memorize 100’s of passwords. Over the years, there have been many password tricks that have been invented, such as using a formula or mashing […]. The post 14 Ways to Create a Secure Password in 2019 (That you’ll Remember) appeared first on IG GURU.

article thumbnail

Some of tech’s biggest names want a future without passwords — here’s what that would look like via CNBC

IG Guru

The post Some of tech’s biggest names want a future without passwords — here’s what that would look like via CNBC appeared first on IG GURU. Check out the article here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Posts on IG GURU in 2019

IG Guru

Security, blockchain, legacy media (tape), leadership, frameworks, and misuse of information continue to be popular topics on IG GURU. 14 ways to create a secure password Popular Information Governance Frameworks and Models What is a hacker? Below are the top posts from 2019.

article thumbnail

LibSSH Flaw Allows Hackers to Take Over Servers Without Password

IG Guru

October 16, 2018Mohit Kumar A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server without requiring a password.

article thumbnail

Hong Kong: Data Security Measures Guidance published by the PCPD

Data Protection Report

As data breaches and cyber attacks continue to surge and attackers become more sophisticated, organisations are well aware that the need for robust data security measures is becoming increasingly important. The Guidance Note sets out seven key recommendations for data security measures to data users in managing data security.

article thumbnail

Respecting Privacy and Data Protection: World Consumer Rights Day

Thales Cloud Protection & Licensing

In a saturated market, businesses must work hard to find the sweet spot, balancing customer experience, cyber security, and compliance. Strengthening customer loyalty means offering a seamless shopping and transaction experience, high levels of data security, and staying abreast of regulatory measures in global and local markets.

Privacy 71
article thumbnail

Hackers leak data on hundreds of German Politicians, including Chancellor Merkel

Security Affairs

” “Personal data and documents belonging to hundreds of politicians and public figures were published on the internet,” government spokeswoman Martina Fietz told reporters. “The government is taking this incident very seriously.” The attack was reported by Parliamentary group leaders late Thursday.