Step 3
Beyond Simple
Passwords
Use these tools to implement stronger passwords and setup multi-factor authentication to better protect your devices and accounts.
You’ve never changed your passwords, and, indeed, one of your former collaborators let your credentials slip to malicious operatives. Now soldiers and civilians on both sides of the conflict don’t know what’s going on, and people are sure to get hurt.
Several variations of this story happened in 2020 in Poland and Lithuania. Hackers used password vulnerabilities to log into the back ends of several reputable news sites reporting on the tensions between Russia and NATO. Several fake stories were published, including fabricated images of German soldiers desecrating Jewish gravestones.
Though only online for a short amount of time, attackers shared the stories broadly, propaganda sites cited the stories, and they were copied onto other sites. Analysts fear that the high speed of such planted stories can sow chaos in breaking news situations, leading to lost confidence in elections and even possible violence.
Making sure your passwords remain a tightly-held secret can prevent unwanted access to your public-facing sites. If you change them frequently and implement two factor authentication, then you give attackers a moving target that’s much more difficult to breach, and you can also prevent old passwords from coming back to haunt you.
Use this tool to secure internal applications by aggregating sources of user identity and trust, and enforcing rules on every request or login.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
This free guide that contains steps for recovering from such incidents where your password may have bene exposed. It highlights...
Should I use a browser-based password manager? Many web browsers now come with password managers built in, and they can be...
This GCA workshop provides real-world scenarios and walks participants through the implementation of recommendations through...
Totem is an online platform that offers interactive courses to learn how to increase digital security and privacy. The optimal...
PasswordManager.com provides information regarding online and password security, including how to choose the best password...
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/