In the cybersecurity field, we often focus on the technical causes and methods by which cyberattacks are carried out, new developments, and vulnerabilities that need to be addressed. However, that’s only half the battle when addressing (or preferably, preventing) a cyberattack.
Have you ever been in the position where you are working on a deadline, trying to beat the clock and all of a sudden you are prompted to change your password? Has it been 90 days already! Of course, the prompts that have been coming up for the last few weeks have been dismissed – you tell yourself, “I’ll do it later.” But now it’s do or die. So, you sit… what shall I change my password to this time? I can’t use something I’ve already used – what have I used? So you pull out your list of sticky notes with all your passwords. Wrong, Wrong, Wrong!