Last time we caught up with our team of geeks-in-residence, our
discussion about wireless network security ended with an obvious step:
the importance of selecting good passwords.
But despite all the preaching by information technology professionals, even power users don’t often follow habits that can help keep systems safe. According to IT firm Trustwave’s 2012 Global Security Report, released last month, weak passwords were responsible for 80 percent of the security breaches the study examined at both small and large organizations.
Bill Chu, chair of the department of software and information systems at UNC Charlotte, said the most common method for hackers to crack................
Read Full Article Here
But despite all the preaching by information technology professionals, even power users don’t often follow habits that can help keep systems safe. According to IT firm Trustwave’s 2012 Global Security Report, released last month, weak passwords were responsible for 80 percent of the security breaches the study examined at both small and large organizations.
Bill Chu, chair of the department of software and information systems at UNC Charlotte, said the most common method for hackers to crack................
Read Full Article Here
No comments:
Post a Comment