These are the top 10 cybersecurity threats for your business

Prev6 of 11Next

6. Bad Passwords

6. Bad Passwords

While password recovery seems like it should be safe–allowing you to answer a question only you should know–our increasingly large digital trails are making it easier and easier for hackers to deduce what your answers might be. Plus, a lot of passwords just aren’t that strong in the first place. Check out the 20 worst passwords of 2015 for a look at some of the most common weak passwords used. And just think, all it takes is one admin with a weak password, and you might have an intruder all over your files. If you have a lot of customer files, like what was stored in Apple’s cloud, you may want to start moving to two-step authentication like Apple after a recent attack.

Prev6 of 11Next

6. Bad Passwords