<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>passwords &#8211; Hopedale Technologies</title>
	<atom:link href="https://www.hopedaletech.com/tag/passwords/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.hopedaletech.com</link>
	<description>Computer Sales and Services</description>
	<lastBuildDate>Tue, 17 Mar 2026 20:14:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.hopedaletech.com/wp-content/uploads/2021/06/cropped-ht_logo3-32x32.png</url>
	<title>passwords &#8211; Hopedale Technologies</title>
	<link>https://www.hopedaletech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">175068569</site>	<item>
		<title>Why You Should Never Share One Login Between Staff</title>
		<link>https://www.hopedaletech.com/why-you-should-never-share-one-login-between-staff/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 20:14:00 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=12977</guid>

					<description><![CDATA[Sharing one login between multiple team members might seem like a convenient shortcut: one password, one username, and fewer things to manage. But what feels simple in the moment can cause serious problems down the track. Whether it&#8217;s security, accountability, or general workplace operations, using a single login is a ticking time bomb. Let&#8217;s walk [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Sharing one login between multiple team members might seem like a convenient shortcut: one password, one username, and fewer things to manage. But what feels simple in the moment can cause serious problems down the track. Whether it&#8217;s security, accountability, or general workplace operations, using a single login is a ticking time bomb.</p>



<p>Let&#8217;s walk through why this is a bad idea and what can go wrong.</p>



<h2 class="wp-block-heading"><strong>No Audit Trail Means No Clarity</strong></h2>



<p>When everyone uses the same login, it becomes impossible to track who did what. Was it Sarah who deleted that folder, or James, or someone pretending to be one of them?</p>



<p>Systems that use individual accounts log activity under a name. Shared logins just say &#8220;admin&#8221; or &#8220;user.&#8221; This creates confusion, especially when something goes wrong and you need to determine what happened. Without an audit trail, there&#8217;s no clarity and no accountability.<br></p>



<h2 class="wp-block-heading"><strong>No Accountability Means More Risk</strong></h2>



<p>If something breaks, something disappears, or something confidential is leaked or shared, shared logins mean nobody&#8217;s on the hook. It&#8217;s easy to say, &#8220;Wasn&#8217;t me,&#8221; when five other people have the same access. This isn&#8217;t just about blame; it&#8217;s about building a business where people take care of the systems and data they use.</p>



<p><strong>READ MORE:</strong>&nbsp;<a href="https://www.hopedaletech.com/stop-account-hacks-the-advanced-guide-to-protecting-your-small-business-logins/" target="_blank" rel="noreferrer noopener">Stop Account Hacks: The Advanced Guide to Protecting Your Small Business Logins</a></p>



<p>When each person has their own login, they know their actions are logged under their name. That alone encourages people to slow down, double-check things, and avoid careless mistakes.<br></p>



<h2 class="wp-block-heading"><strong>One Leak Can Open the Door to Everything</strong></h2>



<p>If one person with a shared login account gets hacked, misplaces a password, or clicks on the wrong link, the entire system is compromised. An attacker now has access to everything that the login can do.</p>



<p>Worse still, shared logins tend to be written down, saved in browsers, or shared over email. The more places that the password exists, the higher the chance someone unwanted finds it. And once they&#8217;re in, there&#8217;s no easy way to trace what they touched or who they pretended to be.<br></p>



<h2 class="wp-block-heading"><strong>It Gets Messy When Someone Leaves</strong></h2>



<p>Let&#8217;s say someone leaves the business, and they still remember the password. Now, you need to update it everywhere where a shared login was used, assuming you even remember which systems it connects to.</p>



<p><strong>READ MORE:</strong>&nbsp;&nbsp;<a href="https://www.hopedaletech.com/where-did-that-file-go-hint-its-in-daves-personal-dropbox/" target="_blank" rel="noreferrer noopener">Where Did That File Go? (Hint: It&#8217;s in Dave&#8217;s Personal Dropbox)</a></p>



<p>It also creates a trust issue. What happens if someone leaves on bad terms? Can they still log in later and cause problems? With individual logins, you can deactivate their account. Done. Clean, easy, no mess.<br></p>



<h2 class="wp-block-heading"><strong>The Fix: Individual Accounts for Every Staff Member</strong></h2>



<p>It may take more time upfront, but providing every staff member with their own login is the right approach. It allows you to:</p>



<ol class="wp-block-list">
<li>Track changes and actions.</li>



<li>Protect your business if someone gets hacked.</li>



<li>Easily remove access when someone leaves.</li>



<li>Encourage staff to take ownership and to care.</li>
</ol>



<p>Additionally, you can grant different individuals varying levels of access. Not everyone needs admin rights. Some just need to see information, others need full control. That kind of flexibility comes only with individual logins.<br></p>



<h2 class="wp-block-heading"><strong>How Hopedale Technologies Can Help</strong></h2>



<p>If you&#8217;re still using shared logins or are not sure how to transition away from them, we can help. We&#8217;ll work with you to set up secure, individual access for each team member that is tailored to how your business runs.</p>



<p>Whether it&#8217;s managing passwords, setting the correct permissions, or reviewing how your systems are currently being used, we&#8217;ve done this many times before. We&#8217;ll make the process straightforward and take the stress out of untangling shared access.</p>



<p>If you&#8217;re starting from scratch, we&#8217;ll help you build it from the ground up. If you&#8217;re dealing with a bit of a mess, we&#8217;ll help clean it up.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12977</post-id>	</item>
		<item>
		<title>The Shared Wi-Fi Password Everyone Knows</title>
		<link>https://www.hopedaletech.com/the-shared-wi-fi-password-everyone-knows/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Thu, 11 Dec 2025 19:50:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=12803</guid>

					<description><![CDATA[The Password That Slowly Spreads to EveryoneMost offices start the same way: Someone sets up the router, picks a Wi-Fi name and password, and moves on. It feels like a job you need to do only once, so it gets forgotten. Over time, that single password ends up in more hands than anyone planned. Staff [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>The Password That Slowly Spreads to Everyone</strong><br>Most offices start the same way: Someone sets up the router, picks a Wi-Fi name and password, and moves on. It feels like a job you need to do only once, so it gets forgotten. Over time, that single password ends up in more hands than anyone planned. Staff need it, contractors ask for it, clients visit and need to send a file, or someone working in reception shares it again because it is easier than asking for permission.</p>



<p>Years later, the same Wi-Fi password is still floating around, yet the office has changed. People have come and gone, devices have been added, and more and more systems rely on that same wireless network. The password stays the same, and the list of people who know it gets longer by the month.</p>



<p>This is where the problems begin.</p>



<p><strong>Why One Shared Wi-Fi Network Creates Hidden Risks</strong></p>



<p>When everyone uses the same Wi-Fi network, you lose all sense of separation. Staff devices sit on the same network as printers, servers, guest phones, contractor laptops, and even random devices that were connected once and forgotten. It feels harmless on the surface, but you are letting everything into the same room.</p>



<p>Guests bring in their own devices, and you have no idea what condition those devices are in. They could have malware installed, outdated software, or questionable apps. Once they connect to your Wi-Fi, they are inside your network. If that device happens to be infected, it can try to reach other systems inside your office. It needs only one weak device to cause trouble.</p>



<p>Past employees are another issue. If the Wi-Fi password never changes, any former staff member can still connect. Some do not intend harm; they simply still have the network stored on their phone. Others may feel annoyed or bitter after leaving and know they still have access. Sitting in the car park with full entry to your internal network is far more common than most business owners realize.</p>



<p>Even with a single shared password, your router will usually show a list of connected devices. With better equipment, you can even see how much traffic each device is using. The problem is that this visibility is shallow and hard to relate to real people and business roles. You see device names, IP addresses, and MAC addresses, not &#8220;accounts&#8221; tied to staff, guests, ex-employees, or random visitor phones.</p>



<p>When everything sits on one flat network and everyone uses the same credentials, it becomes much harder to answer basic questions such as &#8220;Was this a staff device or a guest device?&#8221; or &#8220;Was this traffic coming from the finance team or from the waiting area?&#8221; You might see that a device pulled a lot of data or connected to suspicious sites, but matching a device labelled &#8220;iPhone&#8221; or &#8220;DESKTOP-29456&#8221; to a specific person or group is messy, especially once people have left the business, swapped phones, or brought in their own gear.</p>



<p><strong>What a Safer Network Looks Like</strong></p>



<p>A good business Wi-Fi setup does not rely on one password that never changes. Instead, it separates the network into clear sections. Staff work on their own protected network, office devices such as printers and phones live on another, and visitors have access to a guest network that appears normal to them but cannot access anything else in the office.</p>



<p><strong>READ MORE:</strong> <a href="https://www.hopedaletech.com/6-helpful-tips-to-troubleshoot-common-business-network-issues/">6 Helpful Tips to Troubleshoot Common Business Network Issues</a></p>



<p>This structure is called network segmentation. It is simply the idea that different groups should not all sit in the same place. Once you split the network into logical sections, you gain more control and experience far fewer surprises. Visitors can still connect to the internet, but they cannot browse your servers or internal devices. Staff can work normally without worrying about what someone in reception is doing on their phone. Devices that do not need to interact with your computers, such as cameras or printers, stay isolated so they cannot interfere with anything important.</p>



<p>Alongside segmentation, proper access control helps you manage who can connect and for how long. Instead of a single, shared password that lasts forever, staff have individual access that can be revoked when they leave. Guest Wi-Fi can expire automatically, meaning visitors do not have open access long after their meeting ends.</p>



<p>The goal is a network that still feels simple to staff and guests but has the right boundaries behind the scenes.</p>



<p><strong>Why It Is Hard to Fix on Your Own</strong></p>



<p>Most consumer routers cannot do real network segmentation. They might offer a basic guest option, but they are not built to separate staff devices, office equipment, and visitors in a reliable way. Proper segmentation needs business-grade hardware and careful setup.</p>



<p>Once you move to equipment that supports these features, the configuration matters. Placing printers, cameras, or EFTPOS terminals on the wrong network can disrupt systems that rely on them. Creating multiple Wi-Fi networks without planning can also cause interference or access gaps.</p>



<p>This is why changing the shared password every few months does not solve anything. The network is still one flat space with no separation.</p>



<p><strong>READ MORE:</strong> <a href="https://www.hopedaletech.com/stop-account-hacks-the-advanced-guide-to-protecting-your-small-business-logins/">Stop Account Hacks: The Advanced Guide to Protecting Your Small Business Logins</a></p>



<p>A review helps you decide who needs access to what, which devices should be isolated, and how the network should be structured. With the right gear and layout, everything becomes safer and far easier to manage.</p>



<p><strong>How We Can Help</strong></p>



<p>As a managed service provider, this is one of the most common network issues we fix for small and mid-sized businesses. We look at your setup, your staff, your devices, and the way you work, then we design a clean network structure with the right separation between staff, guests, and office equipment.</p>



<p>That usually includes setting up safe guest Wi-Fi, moving devices to their own networks, replacing the shared password with better access control, and monitoring the network so problems are caught early. Once the structure is in place, everything becomes simpler. Staff get stable Wi-Fi, guests still get online, and you get a network that is safer, cleaner, and far easier to manage.</p>



<p>If your password is written on a whiteboard, known by people who left years ago, or shared freely with every visitor, it is time to fix it. A short conversation is usually all it takes to see where the gaps are and how we can close them.</p>



<p>Let us review your setup and help you move beyond the single password that has outgrown your business.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12803</post-id>	</item>
		<item>
		<title>Password Autofill:  Convenience Compromising Security?</title>
		<link>https://www.hopedaletech.com/password-autofill-convenience-compromising-security/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Mon, 19 Jun 2023 17:08:58 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=7130</guid>

					<description><![CDATA[&#8220;What&#8217;s that password again? Wait, I changed it … Harrumph. I don&#8217;t remember!&#8221; We&#8217;ve all been there, sometimes many times a day. Password autofill on our Web browsers felt like the sun was shining on our online activity again. Sorry to tell you, but this convenience may not be entirely safe. Most browsers will ask after you’ve [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><em>&#8220;What&#8217;s that password again? Wait, I changed it … Harrumph. I don&#8217;t remember!&#8221; </em>We&#8217;ve all been there, sometimes many times a day. Password autofill on our Web browsers felt like the sun was shining on our online activity again. Sorry to tell you, but this convenience may not be entirely safe.</p>



<p>Most browsers will ask after you’ve entered a new password into a site or changed a password if you want it stored for you. That way, when you revisit that site, the browser can autofill your access credentials. It saves you the struggle of trying to keep all your passwords straight.<br><br><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong>&nbsp; <a href="https://www.hopedaletech.com/letmein101/" target="_blank" rel="noreferrer noopener">How the Bad Guys Get Your Passwords</a></p>



<p>The problem is that some sites, including legitimate sites, can be compromised with a hidden form. You’ll never see it, but your browser will. So, it will autofill that form in clear, unencrypted text. This allows bad actors to capture your username and password without your knowledge.</p>



<p>Another risk? Irresponsible digital marketers may use hidden autofill forms to track your online activity. That’s done without your consent.<br><br><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong>&nbsp; <a href="https://www.hopedaletech.com/picking-your-home-browser/" target="_blank" rel="noreferrer noopener">Picking Your Home PC Browser</a></p>



<p>Using browser autofill with a password manager can also confuse, especially if your browser auto-fills, whereas the manager asks before filling in forms. Using both simultaneously, you also risk duplicating passwords, which could make it challenging to track your passwords and increase the risk of security breaches.<br><br><strong>How to turn off autofill</strong></p>



<p>You can protect your passwords by turning off autofill on any browser you use:</p>



<ul class="wp-block-list">
<li>On Microsoft Edge, go to Settings, then Profiles, then Passwords, and turn off “Offer to save passwords.”</li>



<li>On Google Chrome, go to Settings, then Passwords, and turn off “Offer to save passwords.”</li>



<li>On Firefox, open Settings, then Privacy &amp; Security, then Logins and Passwords, and “Autofill logins and passwords.”</li>



<li>On Safari,&nbsp;from the Preferences window, select and turn off Auto-fill.</li>
</ul>



<p><strong>Can I keep using password managers?</strong></p>



<p>A password manager, such as <a href="https://www.lastpass.com/?irclickid=0Fs38BUHWxyNUCESf4yMnTk6UkFxGkztuVrB2g0&amp;clickid=0Fs38BUHWxyNUCESf4yMnTk6UkFxGkztuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program&amp;irgwc=1" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;(our choice) or 1Password, typically provides more security than browser autofill. Password managers have robust encryption algorithms to protect your login credentials, which means that even if your device is compromised, your passwords are safe.<br><br><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong>&nbsp; <a href="https://www.hopedaletech.com/benefits-of-password-managers/" target="_blank" rel="noreferrer noopener">The Benefits of Password Managers</a></p>



<p>Still, you face the same risks if the manager auto-fills your credentials. Most password managers have autofill disabled by default. That’s good. Leave preemptive autofill off. You might see it called “Autofill on page load.” Keep that turned off, too.</p>



<p>Our advice? Use a password manager that requires you to click a box before it fills in your credentials. This action prevents your information from automatically populating a hidden form.</p>



<p>Securing your online activity is an ongoing challenge. Hopedale Technologies&nbsp;can help identify ways you can protect your privacy and data online. Contact us today at<strong> 508-478-6010</strong>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7130</post-id>	</item>
		<item>
		<title>Stop making it easier for criminals!</title>
		<link>https://www.hopedaletech.com/cybercriminals/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 22 Feb 2022 16:05:00 +0000</pubDate>
				<category><![CDATA[Education]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6205</guid>

					<description><![CDATA[We know we frequently talk about passwords here at Hopedale Technologies. It&#8217;s because they are an essential step in securing your online accounts. Many of us use the same logins for multiple websites and applications because we don&#8217;t have a photographic memory. Just reusing your password once can expose you to the hacking of a third [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>We know we frequently talk about passwords here at Hopedale Technologies. It&#8217;s because they are an essential step in securing your online accounts. Many of us use the same logins for multiple websites and applications because we don&#8217;t have a photographic memory. Just reusing your password once can expose you to the hacking of a third party entirely out of your control.</p>



<p>Regularly, there are stories about major companies being hacked, their customer data stolen, and their customers left stranded in the news today.  Hackers commonly use data stolen from one site to access others where login credentials have been reused between accounts.  In some cases, access to bank accounts has been gained simply by using a compromised email account.</p>



<p>Businesses and individuals can face significant losses simply because a third party outside their control has been hacked or compromised.</p>



<p><strong>Password Management</strong></p>



<p>Good security practice uses a unique and strong password for every login you use.  A strong password should include, where possible, capital letters, lowercase letters, numbers, and character symbols. It is clearly impossible to manually remember a strong password for each one of the dozens of logins needed today.  Few would even attempt to.  A password manager makes storing, retrieving, and using unique passwords easy.</p>



<p>When using a password manager, an individual must remember only one strong password to access a database, which contains a different login password for each service.  This database can be synced between multiple devices, saved and backed up to the cloud, and even used to create strong passwords for you.</p>



<p>We’re happy to suggest the best solution for your needs and set it up, too. Here at Hopedale Technologies, we use LastPass to manage our passwords. To learn more about LastPass click&nbsp;<a href="https://www.lastpass.com/?irclickid=1gYSBLyT5xyIUXvWC1ScxTYRUkG3X5UBuVrB2g0&amp;irgwc=1&amp;clickid=1gYSBLyT5xyIUXvWC1ScxTYRUkG3X5UBuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" rel="noreferrer noopener" target="_blank">HERE</a>.&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6205</post-id>	</item>
		<item>
		<title>How to Prevent Password Spraying Attacks</title>
		<link>https://www.hopedaletech.com/password-spraying/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 01 Feb 2022 18:23:00 +0000</pubDate>
				<category><![CDATA[Education]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[multifactor authentication]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6156</guid>

					<description><![CDATA[Bad cyber actors are what the kids these days would call “try-hards.” They do everything they can think of to get into your accounts. One tactic is password spraying. In case you don’t know about it, this article gives the basics and shares strategies to prevent this type of attack. You&#8217;re probably familiar with hackers [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Bad cyber actors are what the kids these days would call “try-hards.” They do everything they can think of to get into your accounts. One tactic is password spraying. In case you don’t know about it, this article gives the basics and shares strategies to prevent this type of attack.</p>



<p>You&#8217;re probably familiar with hackers trying many different password combinations with a&nbsp;username. Web security services know about this form of attack, too. That&#8217;s why you can get locked out of your site for trying the wrong password too many times.<br><br>This brings us to password spraying. The cybercriminals have found a way to get around the three-tries-and-you&#8217;re-out-of-luck defense. Instead of one user and many passwords, they use one password with many different usernames.<br><br>Think how easy this could be. Your company database is online for people to contact your employees. The bad actor takes john@yourcompany.com, jane@yourcompany.com, jamal@yourcompany.com, and so on, or they buy a list of usernames on the Dark web. Then, they try common passwords for every one of those individuals.<br><br>&#8220;Abc123,&#8221; &#8220;123456,&#8221; and … ugh … &#8220;password&#8221; are still frequently in use worldwide as passwords. So, it&#8217;s not that much of a stretch for a hacker to be able to get in with one of these common permutations.<br><br>The brute-force attack runs through a long list of users before trying the next &#8220;wrong&#8221; password. So, by the time it has finished going through the list of users with the password &#8220;abc123&#8221;, enough time has passed to avoid lockouts, and the hacker tries another password from the user list.<br></p>



<h2 class="wp-block-heading" id="what-to-do-about-password-spraying">What to do about password spraying</h2>



<p>The most obvious thing? <strong>Stop using any of the passwords that appear on the most commonly used worldwide lists!</strong>&nbsp;Do you think no one would still be using these obvious options? In 2021, there were more than 3.5 million reported uses of the &#8220;123456&#8221; password. &#8220;Password&#8221; came in second with 1.7 million reported uses. Both take less than a second to crack.</p>



<p>You should use more complicated passwords. This doesn&#8217;t have to mean that users add seven numbers, six symbols, and three capitalized letters. The National Institute of Standards and Technology (NIST) guidelines suggest length is more important. So, users can create longer yet easier-to-remember passwords. NIST further recommends checking every new password against a breached password list.</p>



<p>Multifactor authentication helps, as well. This requires the user to verify themselves with access credentials and extra authentication. This might be a code sent via text to a smartphone or could involve an authentication app.</p>



<p>It&#8217;s also a good idea to segment your networks so that users access only what they need to. Limiting user access can minimize the damage done if there is a breach.</p>



<h2 class="wp-block-heading" id="put-password-best-practices-in-place">Put password best practices in place</h2>



<p>Keep your business secure with the help of a managed service provider. We can spearhead the installation of lockout policies and&#8211; other security measures. Our experts also stay current with the latest vulnerabilities to proactively protect your organization.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6156</post-id>	</item>
		<item>
		<title>The Unexpected Benefits Of Password Managers</title>
		<link>https://www.hopedaletech.com/benefits-of-password-managers/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 11 Jan 2022 18:04:00 +0000</pubDate>
				<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[safety]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6094</guid>

					<description><![CDATA[The main advantage of a password manager is obvious to anyone with more than one account online (i.e. everyone). Instead of remembering all 100 usernames and passwords, the password manager auto-fills them. But it’s not the only reason to use a password manager. See below for several more unexpected benefits. Password manager programs generate, manage, [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>The main advantage of a password manager is obvious to anyone with more than one account online (i.e. everyone). Instead of remembering all 100 usernames and passwords, the password manager auto-fills them. But it’s not the only reason to use a password manager. See below for several more unexpected benefits.</p>



<p>Password manager programs generate, manage, and store many different passwords. You may be concerned about whether a password manager is safe to use. But, the cybersecurity industry consensus is “yes, it is.”<br><br>A password manager uses top-notch encryption to protect passwords. Plus, they take a zero-knowledge approach. They can’t actually see the passwords they store and prefill on sites. The password is encrypted before it reaches the manager’s server and can’t be deciphered. This is why you need to be so careful not to forget your master password!<br><br>Using a password manager is one of our&nbsp;<a href="https://www.hopedaletech.com/7-tips-for-better-cybersecurity/" target="_blank" rel="noreferrer noopener">7 Tips for Better Cybersecurity</a>. That said, the password manager offers more than a vault for encrypted credentials.<br>&nbsp;<br><strong>More Benefits of Password Managers</strong><br><br>For one thing, many password managers have apps for download onto mobile devices. Then, you can use the password manager to prefill forms on those, too. This gives you the advantage of convenience not only on your&nbsp;computer but also on the go.<br><br>Some password managers offer added security benefits, as well. They might:</p>



<ul class="wp-block-list"><li>warn you of weak password and login credentials;</li><li>remind you to change your passwords;</li><li>notify you if your passwords may have been&nbsp;<a href="https://www.hopedaletech.com/are-your-passwords-compromised/" target="_blank" rel="noreferrer noopener">compromised</a>&nbsp;in a breach;</li><li>advise you against using the&nbsp;<a href="https://www.hopedaletech.com/got-a-case-of-password-exhaustion/" target="_blank" rel="noreferrer noopener">same password on multiple sites</a>.</li></ul>



<p>Another advantage is that you can conveniently share passwords with others. Maybe you want to give family members shared access to streaming accounts or allow a work colleague access to applications you’re using remotely. A managed password sharing feature can allow them to see selected passwords. You aren&#8217;t showing everything: you can pick what you make available. Plus, when you change your credentials, the password will change on their end, too. This doesn&#8217;t need to be permanent either. You can easily revoke password sharing.<br><br>You can also use a password manager to secure other important information. You might store things such as credit card numbers or other personal identifying information. Keeping that kind of data in an unencrypted note on your desktop or mobile device is unsafe, but you can take advantage of password manager encryption to safely store those precious details.&nbsp;<a href="https://www.hopedaletech.com/letmein101/" target="_blank" rel="noreferrer noopener">Learn how the bad guys get your passwords</a>.<br>&nbsp;<br><strong>Secure your passwords with a manager</strong><br><br>You can&#8217;t expect to remember all your unique passwords. Yet the days of writing down passwords on Post-it notes are over. Use cloud-based password management to secure your passwords and do more.<br><br>We’re happy to suggest the best solution for your needs and set it up, too. Here at Hopedale Technologies, we use LastPass to manage our passwords. To learn more about LastPass click&nbsp;<a href="https://www.lastpass.com/?irclickid=1gYSBLyT5xyIUXvWC1ScxTYRUkG3X5UBuVrB2g0&amp;irgwc=1&amp;clickid=1gYSBLyT5xyIUXvWC1ScxTYRUkG3X5UBuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">HERE</a>.&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6094</post-id>	</item>
		<item>
		<title>3 Reasons To Avoid Signing In With Facebook Or Google Accounts</title>
		<link>https://www.hopedaletech.com/3-reasons-to-avoid-signing-in-with-facebook-or-google/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 21 Dec 2021 18:51:00 +0000</pubDate>
				<category><![CDATA[Education]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6083</guid>

					<description><![CDATA[Nine out of ten times today when you visit a website you’re asked to sign in. To add convenience, many sites offer the ability to sign in using a Facebook or Google account. Sure, it’s simpler, but this article will share three key reasons why you might want to avoid this easy route. It&#8217;s estimated [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Nine out of ten times today when you visit a website you’re asked to sign in. To add convenience, many sites offer the ability to sign in using a Facebook or Google account. Sure, it’s simpler, but this article will share three key reasons why you might want to avoid this easy route.</p>



<p>It&#8217;s estimated that we each have an average of 100 passwords. That&#8217;s a lot to remember, especially as we need unique logins for every site to lower our risk of cyberattack.&nbsp;</p>



<p>At the same time, every website wants us to set up an account. It helps them get to know their users and&nbsp;target marketing and product development efforts. They might also share the information with third parties as another source of income.</p>



<p>Still, the website wants to keep its users coming back, so they allow you to sign in with Google or Facebook accounts to streamline the process. Weigh the value of that added convenience against these three considerations.</p>



<p><strong>#1 You&#8217;re</strong><strong>&nbsp;giving away more data</strong></p>



<p>By using Google or Facebook to sign in on other websites, you give the sites greater access to information about you. Now, they not only know what you do on their sites, but you&#8217;re also allowing them to build out their picture of you with data insights from the shared sites.</p>



<p>Google and Facebook have powerful tools to dig deeper into your online activity, and other websites can also extract data from your Facebook and Google accounts. If you don&#8217;t read the privacy policies, you may not know what sensitive data the platforms share. To learn more about privacy on Facebook, read&nbsp;<a href="https://www.hopedaletech.com/facebook-privacy/" target="_blank" rel="noreferrer noopener">Everything You Need to Know About Facebook Privacy</a>.</p>



<p><strong>#2 You could lose access</strong></p>



<p>You may join those who decide to quit Facebook or leave Google in favor of another platform. If you do so and you have used that account to access other sites, you&#8217;ll have to create new logins.</p>



<p>Even if you&#8217;re not going to do away with your Facebook or Google account, you could still lose access. If there&#8217;s a major outage at one of those two sites, you won&#8217;t be able to log in at any of your connected sites either. The other websites won&#8217;t authenticate you until Facebook or Google is back up and running.</p>



<p><strong>#3 Your attack surface gets bigger</strong></p>



<p>If you have one unique login credential for a website, you risk your data there only if that site gets hacked. However, if you use Facebook or Google login, and bad actors compromise that account, they can access any shared sites.</p>



<p>Think of it like dominos. The Facebook or Google account is the first to fall, but all those other accounts you &#8220;conveniently&#8221; login to using those credentials will come tumbling down soon after. Don&#8217;t think the attacker won&#8217;t bother looking for other connected accounts?&nbsp;Once they breach one account, all they have to do is go into your settings to see what you have connected.</p>



<p>Social media accounts are also a prime target. Don&#8217;t believe us? Bet you&#8217;ve seen a post from a Facebook friend (or ten) telling you to ignore strange activity due to a hacked account. Here are&nbsp;&nbsp;<a href="https://www.hopedaletech.com/facebook-cloning-scam/" target="_blank" rel="noreferrer noopener">Ten Ways to Protect Yourself from the Facebook Cloning Scam</a>.</p>



<p><strong>Protect your online identity</strong></p>



<p>Account compromise is a top cause of data breaches worldwide. Protect your online identity by following best practices for cyber hygiene.&nbsp;<a href="https://www.hopedaletech.com/7-tips-for-better-cybersecurity/" target="_blank" rel="noreferrer noopener">Seven Tips for Better Cybersecurity</a>&nbsp;will help give you smart&nbsp;steps to take.</p>



<p>Need help with password security? At Hopedale Technologies, we use our affiliate&nbsp;<a href="http://https//www.lastpass.com/?irclickid=V59RZ63s2xyIUXvWC1ScxTYRUkG11l2FuVrB2g0&amp;irgwc=1&amp;clickid=V59RZ63s2xyIUXvWC1ScxTYRUkG11l2FuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;password manager to keep our passwords and logins secure. We&nbsp;can set you up with&nbsp;<a href="https://www.lastpass.com/?irclickid=V59RZ63s2xyIUXvWC1ScxTYRUkG11l2FuVrB2g0&amp;irgwc=1&amp;clickid=V59RZ63s2xyIUXvWC1ScxTYRUkG11l2FuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;and&nbsp;provide other online security help like&nbsp;<a href="https://www.lastpass.com/?irclickid=V59RZ63s2xyIUXvWC1ScxTYRUkG11l2FuVrB2g0&amp;irgwc=1&amp;clickid=V59RZ63s2xyIUXvWC1ScxTYRUkG11l2FuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">VIPRE Managed Antivirus</a>.&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6083</post-id>	</item>
		<item>
		<title>7 Tips For Better Cybersecurity</title>
		<link>https://www.hopedaletech.com/7-tips-for-better-cybersecurity/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 12 Oct 2021 17:50:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6017</guid>

					<description><![CDATA[KEEP SOFTWARE CURRENT: Your best bet to protect against viruses, malware, and online threats is to keep your antivirus, browser, and&#160;operating system&#160;up to date.&#160; PROTECT ALL INTERNET DEVICES:&#160; Computers, smartphones, and gaming systems&#160;need antivirus protection. Don&#8217;t forget to use your antivirus software to scan USBs and external devices too. USE AUTHENTICATION WHEN AVAILABLE: Secure&#160;your online [&#8230;]]]></description>
										<content:encoded><![CDATA[
<ol class="wp-block-list"><li>KEEP SOFTWARE CURRENT: Your best bet to protect against viruses, malware, and online threats is to keep your antivirus, browser, and&nbsp;<a href="https://www.hopedaletech.com/why-your-windows-updates-are-more-important-than-ever/" target="_blank" rel="noreferrer noopener">operating system</a>&nbsp;up to date.&nbsp;</li><li>PROTECT ALL INTERNET DEVICES:&nbsp; Computers, smartphones, and gaming systems&nbsp;need antivirus protection. Don&#8217;t forget to use your antivirus software to scan USBs and external devices too.</li><li>USE AUTHENTICATION WHEN AVAILABLE: Secure&nbsp;your online accounts by enabling the most robust&nbsp;<a href="https://www.hopedaletech.com/2-factor-authentication/" target="_blank" rel="noreferrer noopener">authentication</a>&nbsp;tools available, such as biometrics, security keys, or a unique one-time code through an app on your mobile device.</li><li>UNIQUE ACCOUNT, UNIQUE PASSWORD: Different&nbsp;<a href="https://www.hopedaletech.com/got-a-case-of-password-exhaustion/" target="_blank" rel="noreferrer noopener">passwords</a>&nbsp;for every account helps to thwart cybercriminals.&nbsp;Use a password manager such as&nbsp;<a href="https://www.lastpass.com/?irclickid=11oRuc2PzxyIU-LSYLyQdQ62UkBXKlwRuVrB2g0&amp;irgwc=1&amp;clickid=11oRuc2PzxyIU-LSYLyQdQ62UkBXKlwRuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;to help keep track.&nbsp;</li><li>IF SOMETHING LOOKS SUSPICIOUS, DELETE IT:&nbsp; Links in&nbsp;<a href="https://www.hopedaletech.com/5-red-flags-of-phishing-emails-think-before-you-click/" target="_blank" rel="noreferrer noopener">emails</a>, social media posts, and online advertising are&nbsp;how cybercriminals try to steal your information.&nbsp;</li><li>GET SAVVY ABOUT WI-FI HOTSPOTS: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your machine.</li><li>PROTECT YOUR $$: When&nbsp;<a href="https://www.hopedaletech.com/4-simple-tips-for-safe-internet-banking/" target="_blank" rel="noreferrer noopener">banking</a>&nbsp;and shopping, check to ensure the site is security enabled. Look for web addresses with “https,” which means the site takes extra measures to help secure your information. “Http” is not secure</li></ol>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6017</post-id>	</item>
		<item>
		<title>Disk Encryption Protects Your Personal Computers</title>
		<link>https://www.hopedaletech.com/disk-encryption-protects/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Fri, 07 May 2021 16:48:35 +0000</pubDate>
				<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[residential]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=5466</guid>

					<description><![CDATA[Always wanted to feel like a secret agent? Well, here’s your chance! Did you know you can encrypt your hard drive to protect the data on your computer? This is a good way to secure your information, whether at home or on the move with a laptop. Setting up encryption scrambles your data so that [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Always wanted to feel like a secret agent? Well, here’s your chance! Did you know you can encrypt your hard drive to protect the data on your computer? This is a good way to secure your information, whether at home or on the move with a laptop.</p>



<p>Setting up encryption scrambles your data so that only authorized parties can understand the information. Without the encryption key, anyone trying to read your information would see gibberish.</p>



<p>You’re already using encryption when you visit any &#8220;https&#8221; website. The lock symbol beside the URL shows that encryption is protecting your connection with the site. You’ll see it when shopping or banking online, and it’s protecting the data in transit.</p>



<p>You can also encrypt the data on your computers.</p>



<p><strong>Password Protection Is Not Enough<br></strong><br>Many people at this point have a password for their user account on a home computer or laptop. Some of these passwords are even complicated, although the number-one password people use continues to be “123456” – seriously – followed by “123456789” and “qwerty.”</p>



<p>Regardless of its strength, the logon password doesn’t stop anyone with physical access. You might have your browser remembering usernames and passwords (it’s not a shared computer, right?), and anyone with access can use those pre-populated credentials to access your accounts.</p>



<p>If someone really wants to get to password-protected files on a physical device, they can do so. The attacker might bypass your password by booting your computer up to a new operating system. Or the bad guy might even remove your hard drive and put it into a new computer. All they need is a second computer and a screwdriver!</p>



<p>Full disk encryption protects those files, even if the attacker has physical access and even if your laptop is lost or stolen, your home is burglarized, someone seizes your computers.</p>



<p><strong>Encryption Is Not a Silver Bullet<br></strong><br>Of course, we need to be clear. Encrypting your hard disk doesn’t make your computer invincible to cyberattackers, although does force them to work a lot harder.</p>



<p>Attackers can also still exploit services running on your computer, such as network file sharing. Plus, encryption doesn’t stop a nefarious agency from spying on your online activity in transit.</p>



<p>Nevertheless, it does beef up your physical security. You can encrypt an external hard drive or your system’s entire hard drive. Then, when you turn the computer on, you’ll need to unlock the disk to boot up your operating system. The computer won’t work until the user supplies the encryption key or passphrase. You can also create multiple unlocking keys if you have several user accounts for that device.</p>



<p>Again, you’re going to want to come up with a strong password. If your key phrase is “password,” (the fourth most common choice in 2019), there&#8217;s little point in encryption.</p>



<p>You also don’t want to walk away from your laptop, leaving it open and accessible. You’ll want to set your encryption program to lock again after a certain amount of idle time. Otherwise, you’ll find encryption doesn’t impact your computer’s performance.</p>



<p>Make sure your computers and laptops are always physically secure. With disk encryption, only people you trust can access your data and files.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5466</post-id>	</item>
		<item>
		<title>What To Do If Your Data Is Included In A Data Leak</title>
		<link>https://www.hopedaletech.com/data-leak/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 04 May 2021 17:47:00 +0000</pubDate>
				<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=5588</guid>

					<description><![CDATA[There is no easy way to know if your information has been in a data leak. When a business is hacked, it typically sends a notification letting you know, but this isn’t guaranteed. And you can’t go in and check the Dark Web. It is difficult to find and dangerous to access, and that is [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>There is no easy way to know if your information has been in a data leak. When a business is hacked, it typically sends a notification letting you know, but this isn’t guaranteed. And you can’t go in and check the Dark Web. It is difficult to find and dangerous to access, and that is why the bad guys like it.</p>



<p>It’s a good idea to navigate to <a href="https://haveibeenpwned.com" class="rank-math-link" target="_blank" rel="noopener">https://haveibeenpwned.com</a> to see if your email address or phone number is on any data breach files. This isn’t conclusive, but it can help.</p>



<p>Even if you’re not sure if you’ve been a victim of a data leak, you’ll want to take action.</p>



<p>There are several smart strategies to follow immediately.</p>



<p><strong>#1 Limit your social sharing</strong></p>



<p>It is simple to share on social media – that is part of the fun. You share the pictures of your wedding day or anniversary or your new house with its address. You’re filling in family and friends in your life, right?</p>



<p>Well, if you are using any of that information to create access credentials, you are sharing too much. Someone with a beloved cat called “Petunia” in every photo who uses the feline’s name as a password gives hackers an edge.</p>



<p>You might think you are sharing harmless information, but those birthday party photos posted on the big day are a clue to your identity that hackers can exploit.</p>



<p><strong>#2 Use Unique Passwords</strong></p>



<p>Would you believe people still use “12345678” and “password” as their passwords? If you are one of them, stop now. We’ve said it before, and we’ll say it again and again: use unique passwords for every one of your accounts. Yes, it is more to remember, but it helps cut the risk of a data breach at one site snowballing to disastrous consequences for you.</p>



<p>You might use a password keeper such as&nbsp;<a href="https://www.lastpass.com/?irclickid=zlBz4TwoJxyLTeGwUx0Mo38KUkBxFISVyXt3Qk0&amp;irgwc=1&amp;clickid=zlBz4TwoJxyLTeGwUx0Mo38KUkBxFISVyXt3Qk0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;to manage your many passwords. This is more secure than the password manager offered by your Web browser, although those are better than revising passwords or trying (hopelessly) to memorize them.</p>



<p><strong>#3 Add Two-Factor Authentication (2FA)</strong></p>



<p>Enabling two-factor authentication (2FA) makes it more challenging for the bad actor. Now, they will need to obtain access to login credentials and your personal device. However, since phone numbers are often included in a data leak, this isn’t the best solution. If the hacker has your name, address, and birthdate from the Dark Web, they can take over your phone number, too. They call the company and say, “I lost my phone. Can I get another SIM card?” Then, they are the ones to get those verification codes via message, not you.</p>



<p>Better still, use a 2FA app to confirm your identity. Authy or&nbsp;<a href="https://www.lastpass.com/?irclickid=zlBz4TwoJxyLTeGwUx0Mo38KUkBxFISVyXt3Qk0&amp;irgwc=1&amp;clickid=zlBz4TwoJxyLTeGwUx0Mo38KUkBxFISVyXt3Qk0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;are good authenticator apps. After you attempt to log in, you will need to enter a time-sensitive code generated by the app to complete access.</p>



<p><strong>#4 Stop Signing into Other Sites Using Social</strong></p>



<p>Sure, it is convenient to use your Facebook or other social media account to sign in to connected applications because you have fewer passwords to remember. Some of your data is automatically transferred, so signup is streamlined, too. Yet you are increasing the risk of account compromise.</p>



<p>The hacker may access the third-party application and use that as a stepping stone to get into your social account. That’s where the trove of data is.</p>



<p><strong>#5 Develop an Alternate Ego</strong></p>



<p>It all sounds super spy, but you might have one email account you open to be a burner account for social media. You could also use a fake birth date, a fake alma mater, and other alternative facts to fill out the social profile.</p>



<p>Don&#8217;t fabricate personal details for an employer or a financial or educational institution. But you might use a fake identity for entertainment, gaming, and social sites that bad guys may mine for personal data.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5588</post-id>	</item>
	</channel>
</rss>
