No Username or Password… No Wishes!

By Theon Alleyne, CRCP, CCEP , USA Senior Managing Consultant,IBM


Apparently 8.4 Billion passwords were revealed on a hacker forum. The implications are endless. Attackers can simply conduct Brute Force tactics to compromise reused passwords on different sites. Reputable data leak checkers like “Have I Been Pwned” can help, but a better course of action is utilizing a combination of a strong password or a password manager. CyberNews


๐Œ๐ข๐ง๐ ๐ญ๐ก๐ž ๐assword

There are a lot of challenges that come with managing passwords.

The matter is critical for network access in organizations.


As I said before, the human is the weakest link in the cyber security chain. The good news is that there is no host delightfully saying โ€œGood Byeโ€.

With so many accounts to log into, password fatigue sets in quickly. It is important to resist the urge to use common, easy to remember passwords, across multiple sites.

I understand that it reduces stress, but the consequences and cost may go well beyond $1 million.

Here are some actions you can take to protect your companyโ€™s devices or accounts from unauthorized access.

โ›”๏ธ Don’t write down your passwords on a paper very close to the device you work on.

โ›”๏ธ Don’t use the same passwords across multiple platforms.

โž•Add complex words to your passwords.

โž•Use passwords managers to record your passwords so you have to think too much to recall them.



๐ŸŽ๐ฉ๐ž๐ง Sesame !

James Howells, a British IT worker, and Stephan Thomas from San Francisco, wish they could say Open Sesame to get back their fortunes.

Thomas has his fortune in a Bitcoin wallet that holds 7,002 Bitcoin, but he canโ€™t remember the password.

Howells believes his 7,500 bitcoins are on a hard drive in a UK landfill and wants permission to open up the rubbish heap so he can try a different type of mining.

Together almost half a billion dollars is at stake.

Both of these situations speak to the need for exchanges that can hold digital keys securely, and withstand attacks.

Thomas claims he lost the paper where he wrote down the passwords for his IronKey.

IronKey is like a Genie that grants ten wishes/guesses, before going poof! Thomas has two guesses left.

Here are two keys to keep in mind, to secure your digital wallet.

First, enable passwords on your digital device before use, and apply the layers of security provided by the device.

Second, create a password that is unique to you, for your digital wallet, and be sure it is an easily- remembered, yet hard-to-guess password.


Most important, donโ€™t lose your device or password.


ย Bad passwords


Haven’t you learnt anything about using “123456” as passwords?

It is terrible how people ignore good advice.

Password Manager, NordPass reported that a staggering 2.5million number of people still use “123456” as their passwords this year.

If it is way for you, itโ€™s super easy for the bad actors.

The UK National Cyber Security survey in 2019 revealed that 23.2 million people still use “123456” as their passwords, 7.7 million people use “123456789” and 3.6 million people use “password” as their passwords.

We can do better than allowing the bad actors to crack our passwords.

When you want to create strong passwords, avoid using names of football clubs, musicians, dictionary words, number combinations, fictional characters, strings of adjacent keyboard, repetitive characters, your date of birth, phone number or name.

Instead use a combination of upper and lower- case letters including numbers and symbols, make it longer to up to 12 characters or more and never reuse passwords across multiple accounts.

Do you know anyone with an easy password?



๐€๐ซ๐ž ๐ฒ๐จ๐ฎ๐ซ ๐ž๐ ๐ ๐ฌ ๐ข๐ง ๐จ๐ง๐ž ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐›๐š๐ฌ๐ค๐ž๐ญ?

Bad actors just place our Facebook account details on the open market for FREE.

Yes, this is the information you had to give Facebook to get an account. And n

ow itโ€™sย 

all up for grabs … phone numbers, Facebook IDs, full names, locations, birthdates, bios, and maybe, email addresses.

Here are three quick things to consider to protect yourself from fraud and cyber threats.

1. Create a social media email address that is different from your personal or business email.
2. Where possible use a free web phone number like Google Voice for your Social Media account.
3. Change your Social Media password every time you change your business password.



๐——๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฑ๐—ฒ๐—ณ๐˜‚๐—ป๐—ฐ๐˜ ๐—ฎ๐—ฐ๐—ฐ๐—ผ๐˜‚๐—ป๐˜๐˜€….

The recent hack into Colonial Pipeline Co. โ€œColonialโ€ is a clear example of why multi-factor authentication must be used to protect online access.

Investigations into the attack revealed that the hackers gained entry into the network through a virtual private network โ€œvpnโ€ account. VPNโ€™s allows employees to remotely access the company’s computer network.

Interestingly, the hackers used a defunct account that was not disabled.

Further, investigators noted that password a for the inactive account was also discovered in a batch of leaked passwords on the dark web.

What this means is that, an employee may have used the same password on another account that was previously hacked.

The good news is that US Government has recovered more than half of the of $4.4 million ransom Colonial paid to regain access to itโ€™s network.

Colonial was fortunate.

What would happen to the reputation of your financial institution, if it was hacked?ย 



๐—ฆ๐˜๐—ผ๐—ฝ ๐—ด๐—ฟ๐—ฎ๐—ป๐˜๐—ถ๐—ป๐—ด ๐—ฎ๐—ฝ๐—ฝ๐˜€ ๐—ฝ๐—ฒ๐—ฟ๐—บ๐—ถ๐˜€๐˜€๐—ถ๐—ผ๐—ปย to use accessibility services.


Yes, write it down. โœ๏ธ

Always deny requests for accessibility services.

Do you know that any app approved for accessibility services to your device, can take over your device? ๐Ÿง

Which means the game you downloaded can cause the funds in your bank account to disappear. Poof! ๐Ÿ’จ ๐Ÿฅฒ

Also of note…..

Mobile security analysts been found apps on both Google and Apple stores claiming to be helpful utilities, that can scan your device and tell you when updates to chrome, WhatsApp, PDF reader or other apps are available.

In fact, McAfee research revealed that these apps are used to install fake updates that take over a smartphone or tablet and download malware in order to steal the user’s bank account passwords. ๐Ÿฆ

So, before downloading apps, research the developerโ€™s information to see if you find online complaints.

An app available on Google or Apple stores does not mean it is 100% safe.

Latest posts by Theon Alleyne (see all)