<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Unique Password Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/unique-password/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/unique-password/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 26 Nov 2020 20:16:15 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Unique Password Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/unique-password/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 056 Credential Stuffing</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 02:15:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Account Compromise]]></category>
		<category><![CDATA[Account Takeover]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Credential Stuffing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[HaveIBeenPwned]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Reuse]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Unique Password]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2388</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing. Where is this coming from? I have introduced the www.HaveIBeenPwned.com service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing.<span id="more-2388"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2388-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>I have introduced the <a href="https://www.haveibeenpwned.com" target="_blank" rel="noopener noreferrer">www.HaveIBeenPwned.com</a> service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have been included in data breaches. When they&#8217;ve gone to look and see what was breached, in a number of cases they had at least their email address and password for that service were included in the data breach.</p>
<p><em>Also check out previous <a href="https://www.l2cybersecurity.com/weekendwisdom-014-have-you-been-in-a-data-breach/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 014</a>, <a href="https://www.l2cybersecurity.com/weekendwisdom-015-do-you-have-a-unique-password/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 015</a> and <a href="https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 016</a>.</em></p>
<h3>Data breaches are bad. What should they do?</h3>
<p>So they asked me &#8220;What should I do?&#8221;. The first thing of course is always, they must change their password on that service or site or whatever it was that was breached. Then I ask &#8220;Do you use that password anywhere else?&#8221; And they say &#8220;Yeah. I use it on multiple sites&#8221; or &#8220;It&#8217;s my favourite password. I use it everywhere.&#8221;</p>
<p>So I said &#8220;Well you&#8217;re going to have to change that password on all of these other platforms.&#8221;</p>
<p>They say &#8220;That&#8217;s going to be an awful lot of effort. Why should I worry?&#8221;</p>
<h3>Why did you call this post Credential Stuffing?</h3>
<p>You worry because of a thing called Credential Stuffing. What happens is that the bad guys, they take these data breaches, say from LinkedIn back in 2012. They take those email addresses and passwords that they have cracked and they try to sign into Facebook, into Twitter, into Microsoft 365, into Google G Suite, into Gmail and many, many other services. The criminals will try all of these things automatically.</p>
<p>They are stuffing credentials into services to be able to try and break in. That is what credential stuffing is all about. That is why you should not use the same password across multiple platforms and services.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4" length="29665510" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 015 Do you have a unique password</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-015-do-you-have-a-unique-password/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Feb 2020 10:59:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Do you have a unique password]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Pwned Passwords]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Unique Password]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1837</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 15. This week I&#8217;m going to ask &#8220;Do you have a unique password?&#8221; How do I find out Last week we talked about &#8220;HaveIBeenPwned.com&#8220;, the service run by the gentleman called Troy Hunt. This has details of all the data breaches that he has become aware of over the last few&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-015-do-you-have-a-unique-password/">#WeekendWisdom 015 Do you have a unique password</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 15. This week I&#8217;m going to ask &#8220;Do you have a unique password?&#8221;<span id="more-1837"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1837-2" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-015-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-015-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-015-lo.mp4</a></video></div>
<h3>How do I find out</h3>
<p>Last week we talked about &#8220;<a href="https://haveibeenpwned.com/" target="_blank" rel="noopener noreferrer">HaveIBeenPwned.com</a>&#8220;, the service run by the gentleman called Troy Hunt. This has details of all the data breaches that he has become aware of over the last few years.</p>
<p>In some of those data breaches, there have been up to a half a billion passwords included in some of those data breaches.</p>
<p>So Troy has provided a feature on his site to be able to search <a href="https://haveibeenpwned.com/Passwords" target="_blank" rel="noopener noreferrer">if you have a password</a> that is in one of those breaches and how many times has this occurred. So this will show you how unique your password is.</p>
<h3>You&#8217;re right to be sceptical</h3>
<p>Now you might be sceptical and say I&#8217;m not going to type in my password on this website. I don&#8217;t know where it&#8217;s going. I don&#8217;t believe it&#8217;s secure and you can <a href="https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2#cloudflareprivacyandkanonymity" target="_blank" rel="noopener noreferrer">check here</a> to see what he uses to keep your passwords anonymised. You can take a look there and he explains all about it. I will leave you to read through that yourself.</p>
<p>And if you&#8217;re still not convinced you can go down to the bottom of the page and he has provided downloadable links to the files for all these passwords. So you can use them to search yourself. Now you will need to use some technical skills to be able to search those files.</p>
<h3>So do you have a unique password?</h3>
<p>But if you type in your password into the search field and it comes up saying not found. You know, great! You have a very unique password. It hasn&#8217;t been exposed in any of those data breaches.</p>
<p>But if you have a poor password which, unfortunately a lot of people do, you can find out how many other times it has been exposed. Sometimes there are passwords that have more exposure than others. So even still even at low numbers if you have your password, if it&#8217;s not unique you really should consider changing it to something unique.</p>
<p>So that&#8217;s it for this week. Let&#8217;s be careful out there and we&#8217;ll talk to you again next week.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">www.L2CyberSecurity.com</a></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-015-do-you-have-a-unique-password/">#WeekendWisdom 015 Do you have a unique password</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-015-lo.mp4" length="25649435" type="video/mp4" />

			</item>
	</channel>
</rss>
