Password Cracking and How to Protect Your Accounts

Microhills Password Cracking and Protection

Password Cracking and How to Protect Your Accounts

In the age we live in, it’s almost inevitable that you have multiple digital accounts across multiple platforms. You may have an email account (or several), social media accounts, online banking accounts, accounts to access online systems for work, etc. and all these need passwords to keep them secure.

Your passwords are your first line of defense against would-be hackers trying to get unauthorized access to your accounts. But passwords are not foolproof; there are ways that attackers can discover or break through your password to get at your most sensitive of data. This can result in thieves getting into your bank account, your identity being stolen, or a work security breach that can get you fired, just to name a few dire consequences.

But all is not lost. With robust password and account management, you can keep risks down to a bare minimum. To help you with that effort, we here at DigitalJTI have put together this post to guide you in keeping your accounts secure.

Choosing Strong Passwords

The first step in keeping your systems secure is to ensure the password itself is strong. You wouldn’t protect your home with locks made of paper, so why use weak passwords for your accounts? The first thing you should do before making your passwords is check your company’s password policy for work accounts, if one is in place, and check the password policy for the software or website the account is on. These policies are usually put in place by security experts to ensure a minimum level of protection for those accounts. Also, you will have to follow these policies anyways so taking them into account early is simply good sense.

Many people use simple and easy-to-remember passwords such as “password1”, “12345”, their name or names of their family members. Often the first thing hackers try is to guess common passwords or passwords that would be meaningful to the user. Even your name and family members can be gleaned from social media accounts, websites, or email signatures. Try to ensure your passwords are not obvious, personal to you or words that are easily viewed from your desk. And yes, “<child’s name>IsTheBest” or your child’s birthdate is obvious and that information can be found by a quick Facebook lookup or a carefully-worded call to your local school.

Another common strategy for hackers is to use a software algorithm to rapidly try every possible password or a large set of passwords in quick succession. This is known as a brute force attack. To defend against this, your passwords should contain a combination of lower-case, upper-case, numerical and symbol characters and you should opt for longer passwords. As you add more characters and more options for each character, the number of possible passwords rises exponentially, which means a password cracker would need to try more passwords to have a chance to get the correct one. The longer it takes to find the password, the more likely the hacker is to give up and move on.

An simple or obvious password can be found easily by a savvy hacker

You should also make sure to use different passwords for every account. The best password in the world isn’t 100% foolproof. There is also a chance that the website or app the account is on could be hacked. If you use the same password for multiple accounts then if a hacker does get that password, they could try to use the same password on other common sites and apps they expect you to have.

So, in summary we are recommending you keep many passwords that are each long, have a variety of characters and don’t have personal meaning to you. You are likely wondering how you can possibly remember all of them. The good news is you don’t necessarily have to.

Consider a Password Management Service

There are many apps that can be used to effectively manage your passwords. These password management services can store your passwords for all your accounts and most of them can create strong passwords for you. This allows you to have very strong passwords unique to every account without worrying about remembering them all. You only need to remember your master password to log into the password manager.

Many of these services have plugins for your browser that can even auto-fill your password when you visit a website, making them one of the few cases that are both more secure and more convenient. Most will store your passwords on their servers so they can sync across all your devices giving you convenient access to your accounts at any time. The passwords are encrypted, and the decryption key is kept on your device separate from the passwords to protect you even if their server gets hacked.

It can be difficult to keep track of many accounts. A password manager can help

You can find lots of password managers with a quick search in your favorite search engine. Many of them are very affordable and some are even free to use. We would recommend you look at reviews of each one to find one that is trustworthy and suits your needs.

Perhaps you don’t trust any password managers, you don’t want to install any software, or you don’t want to deal with software you don’t understand well. But you still want to have unique and strong passwords for your many accounts. There may be one alternative for you, with a few caveats.

A Low-Tech Alternative

It’s a bit controversial, but some security experts suggest that writing passwords in a carefully protected place can be a good alternative. The main benefit of this approach is that paper cannot be hacked no matter how good a hacker is. However, while this does protect you from remote attacks, it is more vulnerable to local intrusion if anyone gets their hands on your notebook.

The first thing you need to do is keep the record safe. Ideally, you should keep it on your person so the only way someone can get access to it is to take it directly from you. A notebook in your pocket, a card in your wallet or a piece of paper tucked into you shoe all allow you to personally keep your passwords safe. If you must store it somewhere, it should be somewhere no one would think to look or in a very secure location such as a lockbox. Never leave it somewhere someone can see it or look through it, such as on a desk or even in a desk drawer.

Write down as little information as possible. Ideally, even if someone gets your notebook, they shouldn’t be able to tell what password goes with what username and what account. If you must look at it in a not-completely-private location, including in the office, make sure there’s no one in a place where they could easily look over your shoulder.

You also must be careful not to lose the paper or let it get destroyed. Forgetting it in your pants pocket on laundry day is a great way to lose access to all your accounts. You also don’t want to accidentally leave it somewhere anyone else could find it.

To be clear, a password management service would be more secure than writing the passwords on paper, but this method would be better than using weak passwords. If you want to learn more about the ways people can access your accounts through physical documents, check out this other article.

Beyond the Password

So now you know about creating strong passwords and how to keep track of your passwords. What else do you need to be aware of to keep your accounts safe?

First, you need to keep those passwords safe. If there’s ever a need for you to look at a password or to type it out, always make sure there’s no one nearby that could watch you and get your password. If you ever get the feeling that someone might have hacked your account or gained access to your passwords, immediately change the password to all suspected accounts and any accounts associated with them before any harm can be done. You should then check your account to make sure no changes have been made in the settings or the use of the account. Check your banking records for online backing, and your sent folder for email, etc.

Always make sure you log out if you have to leave your device unattended

Be wary of security questions or password recovery questions, such as “What is the name of your first pet” or “What is your mother’s maiden name”. These can undermine a strong password as this information can often be easily gained by a hacker such as through social media or casually talking with your friends or family. You can read our previous article on social engineering to learn more about how a hacker can piece together information to access your accounts. If you must use these security questions, you should always input your own question rather than use the default if that option is available. You should always choose questions you’re confident no one knows or can find out about you. Ideally, if you can keep track of it, you should give incorrect information as the answer to throw off savvy attackers.

If a hacker gets access to your personal computer, they likely will be able to get access to many or all your accounts from there. Even if they cannot immediately, they can install software that tracks what you do and captures your passwords as you type them. Never leave a phone, tablet, or laptop unattended in a public place, including your office. If you must leave a desktop computer unattended, make sure you log out and that a password is required to log in.

You should also consider two-factor authentication. Most websites and apps offer two-factor authentication in their settings menu. This handy security feature will send a message to your phone that must be responded to in order to gain access to an account. This reduces the chance of an intrusion as the hacker would need to get your password and have physical access to your phone. This feature is highly recommended.

Two-factor authentication requires multiple devices, making it much harder for an attacker to gain access to your accounts

Conclusion

As we have discussed here, simply having a password isn’t enough to protect against digital attacks. You must have a strong password and have a unique one for each account. There are methods to allow you to have many strong passwords without having to memorize all of them, especially password management services. There are also methods you can follow to protect your passwords and secure your account in the case of a stolen password, most notably two-factor authentication. By following this advice, you can protect yourself from all but the most die-hard attackers.

JTI Computer Systems Technician

Computer Systems Technician

JOB DESCRIPTION

Computer systems technician will be responsible for installation, maintenance and repair of business electronic equipment such as audio and video systems, mobile phones, computers and peripherals, office equipment and other communication electronic equipment and assemblies.

KEY RESPONSIBILITIES

  • To act as the day to day lead for all Computer hardware, peripherals, devices, phones and software technical support and maintenance activities.
  • To provide expert advice both within the Company and externally on all aspects of electronics repairs.
  • To be responsible for the preparation and monitoring of the Computer hardware, peripherals, devices, phones and software maintenance policies of the Company, including identifying Information and communication technology trends and new legislation and making appropriate proposals to meet changing situations.
  • To be responsible for the programming and scheduling of Computer hardware, peripherals, devices, phones and software technical support services with appropriate procedures, including the preparation of delivery plans, strategies and budgets.
  • Work closely with the Systems Integration Team to ensure that all forecast programmed targets in relation to Computer hardware, peripherals, devices, phones and software repairs are met.
  • To be responsible for the delivery of our computer and electronics project tests.
  • To provide an effective administration of other forms of technical support and overseeing the process for disposing of properties considered surplus to requirements.
  • To ensure that the equipment leases and software licenses entered into for or on behalf of the company are regularly monitored, updated and renewed as required by the lease terms.
  • Ensure the delivery of an excellent quality support service against Key Performance Indicators, which are continually improved and meet the diverse needs of stakeholders. ​

EDUCATIONAL   QUALIFICATIONS: 

​Completion of a university degree in engineering/sciences or two to three years college program in electronics or Completion of a four-year apprenticeship program in electronic servicing and repair. 

EXPERIENCE

Experience in electronics repairs, maintenance, design, build and documentation,  particularly in Computer hardware, peripherals, devices, phones and software products is required.  Candidate must be proficient in use of diagnostics tools, android and IOS administration techniques and use of  other applicable mobile software systems.  Relevant certifications and ability to code in Apps development  languages including Java, Javascript, js, C#, C++, HTML5, PHP  and use a wide variety of system development tools will be an advantage.  

​​

OTHER SKILLS

English language grade of CLB 6+  in IELTS,  CELPIP or TIF is required in addition to Active Listening, Critical Thinking,  Using logic, Complex Problem Solving and Operations Analysis.

​​

SALARY

Attractive and competitive with what is obtainable in the industry. Successful candidate will also benefit from our employee retention programs , bonuses and allowances. These include Extended Medical Insurance, Pension Plan, Work Accident Compensation and Death Insurance.

​​

​​

Interested applicants to please:

Apply on CareerBeacon.com

or

Send application with job title and resume to Career@jeabstech.com

JTI IT Project Coordinator

IT Project Coordinator

Job Description:

Our growing company is seeking to hire an IT Project Coordinator who will be in assisting our Project Managers in project implementation while growing career in project management. This task involves monitoring IT project plans, schedules, work hours, budgets, and expenditures, organizing and participating in stakeholder engagements, and ensuring that project deadlines are met in a timely manner.

To be successful as a Project Coordinator, candidate will have understanding of information technology and will need to be able to work on tight deadlines, be competent project management methodologies and use of Microsoft Office applications. Candidate must be self-motivated with excellent organizational, communication, problem-solving and multitasking skills.                                         

Responsibilities:

  • Maintaining and monitoring project plans, project schedules, work hours, budgets and expenditures.
  • Organizing, attending and participating in stakeholder meetings.
  • Ensure resource planning for all IT projects including systems installations, Apps and Website developments
  • Documenting and following up on important actions and decisions from meetings.
  • Preparing necessary presentation materials for project engagements.
  • Ensuring project deadlines are met.
  • Determining project changes.
  • Undertaking project tasks as required.
  • Developing project strategies.
  • Ensuring projects adhere to frameworks and all documentation is maintained appropriately for each project.
  • Assess project risks and issues and provide solutions where applicable.
  • Ensure stakeholder views are managed towards the best solution.
  • Chair and facilitate meetings where appropriate and distribute minutes to all project team members.
  • Create a project management calendar for fulfilling each goal and objective.
  • Organize contracts, financial files, reports, and invoices, and perform administrative duties such as ordering office supplies, bookkeeping, and billing.
  • roll out new products and features, as well as keep track of bugs.
  • Provide strategy for integration of new products with existing technology.

Qualifications

  • Bachelor’s degree in sciences, social sciences or related field of study.
  • Exceptional verbal, written and presentation skills.
  • Ability to work effectively both independently and as part of a team.
  • Awareness of latest technologies including AI, VR, AR and Machine learning.
  • Awareness of enterprise Software and Hardware selection, implementation and deployment.
  • Willingness to acquire certification in IT Project Management.

SALARY

Attractive and competitive with what is obtainable in the industry. Successful candidate will also benefit from our employee retention programs , bonuses and allowances. These include Extended Medical Insurance, Pension Plan, Work Accident Compensation and Death Insurance.

​​

​​

Interested applicants to please send application with job title and resume to Career@jeabstech.com