ITP Talks Cybersecurity at Forward Fest 2019
A Username and Password is All a Hacker Needs
According to Verizon’s annual Data Breach Investigations Report, stolen login credentials are by far the most common way hackers breach corporate data.
But logging in to a network with legitimate credentials isn’t exactly rocket science or sophisticated. In fact, it’s a very basic way to break in. So why is this simple tactic so common? Because login credentials are easy to obtain on the dark web or by phishing.
Are You Sure Your Data is Safe?
Your business login credentials are like the keys to your company’s front door. You wouldn’t give your house keys to some shifty stranger on the street. Yet many people do exactly that when they don’t consider the cybersecurity consequences of their actions.
Are you guilty of any of these “credential crimes”?
Having weak passwords that are easy to guess
You may already know that “password” and “12345” aren’t strong passwords. But even simple words and phrases like “iloveyou” and “sunshine” are poor password choices.
Is your password on the naughty list? Want to create a stronger password? Read Worst Passwords of 2018.
Using the same password for everything
Pretty self-explanatory, right? Once a hacker knows your one and only password, you’re toast.
Using your business login credentials on other sites
Even if your company’s security is phenomenal, it can’t prevent employees from using their business login credentials on websites with poor security where their information can be stolen.
Roughly half of users will use their business email address and business password in a personal account somewhere else on the internet. If one of those sites is hacked, your business login credentials are now in the hands of bad actors.
Giving your credentials to a hacker through a phishing attack
Phishing emails can be tough to spot since they’re designed to sound and look legitimate. They’ll appear to come from a person or business you trust. But anytime an email asks you for personal information like a cell phone number or login credentials, beware. Call or send a fresh email to the person the email claims to be from and confirm they sent the original email.
Join Us for Hacker’s Havoc Happy Hour
ITP’s cybersecurity experts – including Paul Hager and Dale Harkness – will discuss the current cyber threats impacting small and medium-sized businesses.
They’ll also share how organizations can keep their login credentials off the dark web and better protect their data.
Learn answers to questions such as:
- What information is safe to share online?
- How do I know if my personal data is on the dark web?
- What should I do if it is?
- What are some best practices everyone in my company should be using?
About Forward Festival
Now in its 10th year, Forward Festival is Madison’s flagship technology and entrepreneurship festival. It attracts more than 5,000 attendees and includes 8 full days packed with 40+ events on topics such as:
- Attracting and retaining employees
- How to build a business out of an idea
- Programming and coding
- Data-driven decisions
- Marketing and social media
- And much more
Meet fellow entrepreneurs, nerds, designers, geeks, hackers, foodies, and creative professionals from the Midwest in a celebration of innovation and entrepreneurship.
Learn more at ForwardFest.org.