Fort
|
As groundbreaking leaders in personal security and risk management for travelers, we stand ready to equip and serve as you are called to the ends of the Earth.
|
ARE YOU PREPARED?
|
|
TIPS & ADVICE

HOW CRACK-ABLE ARE YOU?
Brute-force hacking can crack an eight-character password in less than one hour, according to Hive Systems.
In a recently published research article, the security news firm says any password with less than seven characters can be brute-forced "INSTANTLY". Its findings show how more accessible and affordable cloud computing services make it simpler to crack passwords than two years ago, when the company showed that a relatively strong, eight-character password was crackable in eight hours.
While password managers are the best bet for protecting passwords, research also showed that a 12-character password created by a password manager could take some 3,000 YEARS to brute-force crack. Check out this password table of its findings on password-character combinations and their vulnerabilities to brute-force hacks.
Brute-force hacking can crack an eight-character password in less than one hour, according to Hive Systems.
In a recently published research article, the security news firm says any password with less than seven characters can be brute-forced "INSTANTLY". Its findings show how more accessible and affordable cloud computing services make it simpler to crack passwords than two years ago, when the company showed that a relatively strong, eight-character password was crackable in eight hours.
While password managers are the best bet for protecting passwords, research also showed that a 12-character password created by a password manager could take some 3,000 YEARS to brute-force crack. Check out this password table of its findings on password-character combinations and their vulnerabilities to brute-force hacks.

SPRING CLEANING TIME!!
STEP 1: Freshen Your Devices
A) Update software on all Internet-connected devices to reduce risks from malware and infections.
B) Delete unused apps, keeping others current, and reviewing app permissions.
STEP 2: Secure Your Devices
A) Turn on two-factor authentication on critical accounts like email, banking, and social media.
B) Secure your router by making sure it has a strong password and does not broadcast who you are through its name, such as “The Kitchen Family” or “901 Division Street”.
C) Make stronger passwords by combining upper and lower case letters with numbers and symbols.
D) Make unique passwords for important accounts like email, finance, and healthcare.
E) Check to ensure all devices are password or fingerprint protected.
STEP 3: Purge Old Items
A) Clean out your old email and empty “trash” folders. If you need to keep old messages, move them to an archive.
B) Unsubscribe to newsletters, email alerts, and updates you no longer read.
C) Delete or back up old photos, including those on your social media sites.
D) Review your lists of friends on social networks and all contact lists to make sure everyone still belongs.
E) Copy important data to a secure cloud site or another drive where it can be safely stored.
F) Password protect back-up drives and keep them in a different location off the network.
G) Permanently delete all old files and cleanse the cache.
STEP 4: Renew Your Online Profile
A) Review the privacy and security settings on websites you use to be sure they are set at your comfort level for sharing.
B) Update your “online self” by reviewing your personal information and updating it where needed.
STEP 1: Freshen Your Devices
A) Update software on all Internet-connected devices to reduce risks from malware and infections.
B) Delete unused apps, keeping others current, and reviewing app permissions.
STEP 2: Secure Your Devices
A) Turn on two-factor authentication on critical accounts like email, banking, and social media.
B) Secure your router by making sure it has a strong password and does not broadcast who you are through its name, such as “The Kitchen Family” or “901 Division Street”.
C) Make stronger passwords by combining upper and lower case letters with numbers and symbols.
D) Make unique passwords for important accounts like email, finance, and healthcare.
E) Check to ensure all devices are password or fingerprint protected.
STEP 3: Purge Old Items
A) Clean out your old email and empty “trash” folders. If you need to keep old messages, move them to an archive.
B) Unsubscribe to newsletters, email alerts, and updates you no longer read.
C) Delete or back up old photos, including those on your social media sites.
D) Review your lists of friends on social networks and all contact lists to make sure everyone still belongs.
E) Copy important data to a secure cloud site or another drive where it can be safely stored.
F) Password protect back-up drives and keep them in a different location off the network.
G) Permanently delete all old files and cleanse the cache.
STEP 4: Renew Your Online Profile
A) Review the privacy and security settings on websites you use to be sure they are set at your comfort level for sharing.
B) Update your “online self” by reviewing your personal information and updating it where needed.