• Making IT Work
  • 0800 8047 256
  • information@eacs.com
The easiest way to help prevent 80% of Data BreachesThe easiest way to help prevent 80% of Data BreachesThe easiest way to help prevent 80% of Data BreachesThe easiest way to help prevent 80% of Data Breaches
  • About Us
    • Our Story
    • Customer Charter
    • Customers
      • Case Studies
    • ISO Certifications
    • CSR Statement
    • Awards & Recognition
    • Policy Statements
  • Services
    • Services News
    • Managed Services
      • 24/7 Services
      • Device Services
      • Device as a Service
      • Infrastructure Services
      • Security Service
      • Print Service
      • Managed Support Services
      • Managed WAN
      • Case Studies
      • Datasheets
    • Modern Workplace
      • Digital Transformation
      • Strategy Consulting
      • Current State Assessment
      • Desktop Deployment
      • Hardware Products
      • Data Management Solutions
      • Software & Renewal
      • Procurement Portal
        • eacs Selector
      • Lifecycle Management
      • Benefits of Hardware & Software Services
      • Case Studies
      • Datasheets
    • Hybrid Cloud
      • Journey to the Cloud
      • Optimise Virtual Workspace
      • Cloud Migration
      • Cloud Solutions
      • Architecture & Planning
      • Project Management
      • Cloud Availability Suite
      • Case Studies
      • Datasheets
    • Cyber Security
      • Predict
      • Prevent
      • Detect
      • Respond
      • Cybersecurity Made Simple
      • Cyber Essentials
      • Datasheets
    • Apple Services
      • Case Studies
      • Datasheets
    • Apps & Data
      • The Power Platform
      • Data Intelligence
      • Case Studies
      • Datasheets
  • Partners
    • Hybrid Cloud
    • Modern Workplace
    • Security
    • Frameworks
      • Shared Business Services
  • Optimise IT
    • Agenda
    • Exhibitors
  • News & Resources
    • News
      • Featured News
      • eacs in the news
      • eacs Blogs
      • eacs Newsletters
    • Resources
    • Case Studies
    • Datasheets
  • Community
    • Charitable Activities
    • Environment
    • CSR Statement
  • Careers
    • Careers
      • Recruitment Process
    • People Stories
    • Policies
  • Contact
    • Marketing
✕
How can Phishing Attacks be Prevented?
May 14, 2021
Beating the Productivity Challenge with Innovation
October 26, 2021
Published by Marketing on June 10, 2021
Categories
Tags
  • Cybersecurity
  • Password
  • phishing
Image of time to rethink the password blog. Image is of someone typing typing password into laptop

The easiest way to help prevent 80% of Data Breaches

123456, Password, Qwerty. These are three of the most common passwords used today, and unsurprisingly these are also the passwords that lead to the greatest number of security breaches. 80% of data breaches in 2019 were caused by passwords being compromised (source: Verizon), and this threat will only rise with the growth in remote working we’ve seen over the past year.

There are a variety of techniques used by cybercriminals to crack passwords, and eacs have listed just a few of these methods below:

  • Manual guessing – guessing common passwords and personal details such as birthdays or pet names which are usually gotten through reconnaissance from social media accounts
  • Brute force – automated guessing of billions of passwords until the correct one is found, mostly performed using dictionary words
  • Stealing passwords – passwords written on bits of paper and sticky notes near devices can be copied and used
  • Phishing & coercion – tricking people into revealing their credentials such as passwords or bank details
  • Password spraying – trying a small number of commonly used passwords to access a large number of accounts
eacs Top Tips
- Avoid posting personal details on social media sites that could be linked to your password
- Instead of using dictionary words, have a mixture of characters, numbers & symbols
- Avoid re-using the same passwords on different sites
- Always change your password if you click on a suspicious link
- Avoid using previously used passwords in case they have been compromised already

Securing passwords is a quick method of stopping a large number of hackers in their tracks. It can be relatively simple to protect yourself from these threats without the need for expensive systems and processes. We have listed a number of simple steps that can be used to improve your password security without the need for complex and time-consuming processes.

  • Create a strong password policy that must be adhered to by all members of staff
  • Blacklist the most common password choices and use account lockout to stop brute force attacks
  • Use a password vault to store your different passwords
  • Provide regular training for staff against phishing attacks and the risks of weak passwords
  • Don’t automatically expire passwords, instead only ask users to change their passwords when there is a suspicion of a compromise. This works better when users adhere to the password policy that has been set with no weak passwords used in the first instance

One step that all IT security experts recommend is multi-factor authentication (MFA). Microsoft has reported that using a second factor to authenticate users can block 99.9% of all attacks, and can be as simple as a code sent to your mobile phone via a text or an app alongside your username and password.

Our security needs are constantly evolving as hackers become smarter and more resourceful. Utilising the correct processes can greatly reduce the chance of a breach in your defences, although this is just one part of your wider access control and there still many other ways for cybercriminals to get through.

Speak to eacs today on 0800 8047 256 for more information about our range of security services and how we can help keep you and your vital data safe.

Share
0
Marketing
Marketing

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

About

About Us

Corporate Social Responsibility

Customer Satisfaction

Services

Managed Services

Professional Services

Cloud Services

Apple Services

Cyber Security

Hardware and Software

Procurement Portal – eacs Selector

Get in Touch

Head Office:
7 Ramsay Court,
Hinchingbrooke Business Park,
Huntingdon, Cambridgeshire.
PE29 6FY

Tel: 0800 8047 256
Fax: 0845 – 3379 147
Email: Click Here

Policies

Cookies

Disclaimer

Policy Statements

Privacy

Supplier Code of Conduct

© 2020 EACS. All Rights Reserved