SlideShare a Scribd company logo
1 of 3
Download to read offline
Your Password is your shield against malicious
people who tries to hijack any of your account. The
features of a strong password are; it is hard to guess
it by others, and it is easy for you to remember.
Using numbers, symbols and
mixed-case letters in your
password increases the
difficulty of guessing or cracking
your password. Moreover, it is
recommended that you have to
create a unique password for each of your important
account.
When you use the same password across the web, a
cyber criminal can gain access to a less secure
account and then use that password to compromise
your important accounts.
Here some interesting facts, you may never know:
- The average number of internet
users have about 25 online
accounts per a person,
and have 6-7 different
passwords.
- The most common password of all time is 123456.
- Some browsers including Firefox and Google
Chrome let you view ALL of someone's saved
passwords!
Just go to by going to Preferences, then the Security
tab and show all the passwords.
- 66% of the US users have only one or two
passwords.
- A recent study shows that people older than 55
create passwords that are only twice as secure as
the passwords that people under 25 choose!

Finally, there are plenty of free tools of password
generator over the internet.
Try out Softex Strong Password Generator!
For More Related Articles,
Please Visit
http://www.softexsw.com/en/articles.php

More Related Content

Similar to How Strong is Your Password?

‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016 ‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016 niraj joshi
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password CreationnFront Security
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!William Mann
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwordsselcukca84
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)IOSR Journals
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxMewar University
 
Password protection
Password protectionPassword protection
Password protectionpost_it
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptxssuser2f0fb0
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy QueryGloria Stoilova
 

Similar to How Strong is Your Password? (20)

‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016 ‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Password management
Password managementPassword management
Password management
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
OlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_FinalOlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_Final
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptx
 
Password protection
Password protectionPassword protection
Password protection
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 

More from Softex Software House

شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...Softex Software House
 
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءالتعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءSoftex Software House
 
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولشرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولSoftex Software House
 
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتتعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتSoftex Software House
 
تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟Softex Software House
 
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىنظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىSoftex Software House
 
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshareكيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على SlideshareSoftex Software House
 
كتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةكتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةSoftex Software House
 
نظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسنظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسSoftex Software House
 
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتنظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتSoftex Software House
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيSoftex Software House
 
التسويق عبر شبكات التواصل الاجتماعي
التسويق عبر شبكات التواصل الاجتماعيالتسويق عبر شبكات التواصل الاجتماعي
التسويق عبر شبكات التواصل الاجتماعيSoftex Software House
 
التسويق عبر الإنترنت
التسويق عبر الإنترنتالتسويق عبر الإنترنت
التسويق عبر الإنترنتSoftex Software House
 
كيف تختار اسم موقعك؟
كيف تختار اسم موقعك؟كيف تختار اسم موقعك؟
كيف تختار اسم موقعك؟Softex Software House
 

More from Softex Software House (20)

شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
 
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءالتعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
 
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولشرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
 
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتتعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
 
تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟
 
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىنظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
 
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshareكيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
 
كتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةكتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقية
 
نظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسنظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكس
 
Softex_ Clinic Manager
Softex_ Clinic ManagerSoftex_ Clinic Manager
Softex_ Clinic Manager
 
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتنظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
 
Softex Travel Control
Softex Travel Control Softex Travel Control
Softex Travel Control
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Build Everlasting Relationship
Build Everlasting Relationship Build Everlasting Relationship
Build Everlasting Relationship
 
most used colors in Web Design
most used colors in Web Designmost used colors in Web Design
most used colors in Web Design
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
 
التسويق عبر شبكات التواصل الاجتماعي
التسويق عبر شبكات التواصل الاجتماعيالتسويق عبر شبكات التواصل الاجتماعي
التسويق عبر شبكات التواصل الاجتماعي
 
التسويق عبر الإنترنت
التسويق عبر الإنترنتالتسويق عبر الإنترنت
التسويق عبر الإنترنت
 
كيف تختار اسم موقعك؟
كيف تختار اسم موقعك؟كيف تختار اسم موقعك؟
كيف تختار اسم موقعك؟
 

Recently uploaded

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

How Strong is Your Password?

  • 1. Your Password is your shield against malicious people who tries to hijack any of your account. The features of a strong password are; it is hard to guess it by others, and it is easy for you to remember. Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. Moreover, it is recommended that you have to create a unique password for each of your important account. When you use the same password across the web, a cyber criminal can gain access to a less secure account and then use that password to compromise your important accounts. Here some interesting facts, you may never know:
  • 2. - The average number of internet users have about 25 online accounts per a person, and have 6-7 different passwords. - The most common password of all time is 123456. - Some browsers including Firefox and Google Chrome let you view ALL of someone's saved passwords! Just go to by going to Preferences, then the Security tab and show all the passwords. - 66% of the US users have only one or two passwords. - A recent study shows that people older than 55 create passwords that are only twice as secure as the passwords that people under 25 choose! Finally, there are plenty of free tools of password generator over the internet. Try out Softex Strong Password Generator!
  • 3. For More Related Articles, Please Visit http://www.softexsw.com/en/articles.php