The seven myths of cybersecurity: One strong password for every account

The seven myths of cybersecurity: One strong password for every account

Written By: Piyush Bhatnagar

Every day it seems that a new security breach is identified and reported in the news. With Starbucks, Target and a long list of other retailers that have been hacked, it should be abundantly clear to everyone that their online identity and personally identifiable information has been exposed and compromised in some way.

Despite this fact, many Americans still don’t take cybersecurity and online hygiene seriously. Ultimately, users get complacent and start to fall back on bad habits as they prioritize convenience over security. In fact – as my associate, John Lloyd, shared in a previous post – even security experts are susceptible.

Many of these bad habits are based on cybersecurity myths and misconceptions that users have. To help dispel these myths, we decided to illustrate seven of the most common in the form of infographics.

In the first infographic, we looked at the common misconception that frequent password changes and strong password requirements are enough to keep you safe. In the next infographic, we explore another common cybersecurity myth – that a strong, complex password is virtually unbreakable and can be used to secure all accounts.

Here is why I disagree:

Myth 2 update 3 (2)

Stay tuned for the rest of our seven cybersecurity myths infographics on Access Granted in the coming weeks! And, if you want to learn more about some recent, high profile breaches and what security lessons enterprises can learn from them, register for the upcoming Access Granted Webinar, “Anatomy of a Breach.”

About the Author

Piyush Bhatnagar

Piyush is the Chief Technology Officer and Founder at Authomate. Piyush founded the company in 2012 to simplify online security and bring strong authentication to every aspect of life without any added complexity. His responsibilities as CTO include leading innovation, developing product vision and product development.

Piyush is a seasoned technology executive, entrepreneur and consultant with experience in technology development and management. During his 25 year career prior to starting Authomate, he worked for defense, information technology, and network security companies, where he built an extensive resume managing global software teams and executing product strategy.

View all posts by Piyush Bhatnagar

3 Comments

  1. Why one breach begets more breaches – a look at the DropBox “breach” - Access Granted
    Why one breach begets more breaches – a look at the DropBox “breach” - Access Granted2 years ago

    […] was recently illustrated in the Access Granted, “Seven Myths of Cybersecurity,” infographic series, Americans have a pretty serious issue with password reuse. On average, […]

  2. The Seven Myths of Cybersecurity: You don’t have to be a Detective to Spot a Phishing Attack - Access Granted
    The Seven Myths of Cybersecurity: You don’t have to be a Detective to Spot a Phishing Attack - Access Granted2 years ago

    […] that frequent password changes and strong password requirements are enough to keep you safe. In our second infographic, we explored the myth that strong, complex passwords are virtually unbreakable and can be used to […]

  3. In the Wake of the Panama Papers, What Do You Know About Your Provider’s Data Security Practices? - The Chronicle of eDiscovery
    In the Wake of the Panama Papers, What Do You Know About Your Provider’s Data Security Practices? - The Chronicle of eDiscovery2 years ago

    […] and confidence, there are notable areas of weakness including, incident response planning, password security, and security of mobile devices.    These three areas are particularly important since they are […]

Leave a Reply