No password, no problem for NTUC members
- See more at: http://news.asiaone.com/news/singapore/no-password-no-problem-ntuc-members#sthash.ngznewAL.dpuf
Cyber intruders intend to cause harm in cyberspace, such as a hacker stealing personal information. They, then, become you and gain access to every aspect of your life – at work, at home or at school.
You are what they are after. Impersonating you will allow them access to many aspects of your life – e.g. your bank accounts which they can financially benefit from, the contacts of your family and friends whom they can exploit thereafter, etc.
The Internet is created by and accessible through computer networks that share information and facilitate communication. Unlike the physical world, cyberspace has no boundaries across air, land, sea, and space.
There is a range of motives, including seeking confidential information, money, credit, prestige, or revenge. Some just do it for fun. The majority of cyber criminals are indiscriminate.
The Password Guide
Mistakes Commonly Made When Creating Passwords
Tips On Creating Strong Passwords
How You Can Manage Your Passwords
Adopt 2nd Factor Authentication For Maximum Security
This is a quick little introduction on factor authentication to an average user. It was originally something I made at work to help users understand why they would want to use Google Apps' two factor authentication. I made it with nothing but Keynote and Camtasia for Mac. This version was originally posted over at friendsintech.com
UNDERSTANDING CYBER SECURITY
ABOUT NAF & 2FA
Click here to watch an introductory video on 2FA: