SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Making Technology
             Work for You

http://www.marketwatch.com/story/making-technology-work-for-you-2012-05-31
MISSION, KS, May 31, 2012 (MARKETWIRE via
COMTEX) -- (Family Features) With technology
dominating more and more of people's personal and
professional lives, it's easy to lose track of passwords
for smartphones, tablets, laptops, desktops and more.
In addition, for many people, keeping track of online
user names and passwords for various accounts --
email, shopping, social networks, etc. -- has also
become a hassle, and therefore an inconvenience.

In fact, according to a survey conducted by Norton by
Symantec, when given a list of potentially challenging
activities, 40 percent of people ranked remembering
passwords among one of the top three most difficult
tasks. This ranking preceded even balancing a
checkbook.
That same survey also found that 70 percent of
respondents had forgotten at least one password in a
single month, which is why for many, opting for an
easier-to-remember, though weaker password is
preferred. But weak passwords leave accounts and
devices more vulnerable to hackers and scam
artists, which also plays a role in identity theft.
Therefore, it's important to create strong passwords.

Creating a Strong Password According to the United
States Computer Emergency Readiness Team (US-
CERT), following these steps can help you create a
stronger password:
-- Use a combination of both uppercase and lowercase letters,
numbers and special characters when possible.
-- Longer passwords are more complicated and thus stronger. If a
website allows for passwords between six to eight characters,
make sure to take advantage of the longer character allowance.
-- Refrain from using personal dates, such as birthdays, or
names, such as those of your spouse or child. This information
can be discovered by people within your social circle, as well as
hackers, so creating codes around words you'll remember makes
for stronger passwords, rather than full words or names.
-- Do not use the same password across multiple accounts. For
example, if you have created a password for online banking, do
not use that same password to access your work or personal
email account.
For more tips on creating a stronger, less vulnerable
password, visit http://www.us-cert.gov/cas/tips .

Conveniently and Safely Store Your Passwords For
those who have difficulty remembering complicated
passwords however, new services can lend a hand.
Norton Identity Safe -- a free service -- allows you to
conveniently save and synchronize your passwords on
all your devices, while keeping you safe and secure.
The service also allows you to avoid potentially risky
websites, and share URLs via email and social networks
safely through Identity Safe itself.
With Identity Safe you can log in with a single, master
password, then access all of your other accounts and
passwords through your work or personal computer, or
via the app on an iPhone, iPad or Android device.

While it may be tempting to create simple passwords
to use across multiple devices or accounts, taking the
time to create secure passwords can save you from
having to sort out fraudulent charges on banking or
credit accounts. It can also save you from the time-
consuming process of having to recover from the
damages of identity theft.
To learn more about making technology work for
you, visit
https://identitysafe.norton.com/?inid=hho_Various_us_
2012_Jun_IdentitySafe_Matte .

About Family Features Editorial Syndicate This and
other food and lifestyle content can be found at
www.editors.familyfeatures.com . Family Features is a
leading provider of free food and lifestyle content for
use in print and online publications. Register with no
obligation to access a variety of formatted and
unformatted features, accompanying photos, and
automatically updating Web content solutions.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=1998312


          Wendy MacDonald
          wmacdonald@familyfeatures.com
          1-888-824-3337 ext. 235


http://editors.familyfeatures.com


SOURCE: Norton


          mailto:wmacdonald@familyfeatures.com


http://editors.familyfeatures.com/

Weitere ähnliche Inhalte

Andere mochten auch

#PortraitDeCDO - Laurent Assouad - Aéroport de Lyon
#PortraitDeCDO - Laurent Assouad - Aéroport de Lyon#PortraitDeCDO - Laurent Assouad - Aéroport de Lyon
#PortraitDeCDO - Laurent Assouad - Aéroport de LyonOCTO Technology
 
Technology and work design in Organizational Relation
Technology and work design in Organizational RelationTechnology and work design in Organizational Relation
Technology and work design in Organizational RelationSatya P. Joshi
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)UzmaRuhy
 
Tecnologia na sociedade
Tecnologia na sociedade Tecnologia na sociedade
Tecnologia na sociedade mluisavalente
 
Tecnologia
TecnologiaTecnologia
TecnologiaMarta
 
Finding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of ThingsFinding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of ThingsPamela Pavliscak
 
Technology Vision 2017 infographic
Technology Vision 2017 infographicTechnology Vision 2017 infographic
Technology Vision 2017 infographicAccenture Technology
 

Andere mochten auch (7)

#PortraitDeCDO - Laurent Assouad - Aéroport de Lyon
#PortraitDeCDO - Laurent Assouad - Aéroport de Lyon#PortraitDeCDO - Laurent Assouad - Aéroport de Lyon
#PortraitDeCDO - Laurent Assouad - Aéroport de Lyon
 
Technology and work design in Organizational Relation
Technology and work design in Organizational RelationTechnology and work design in Organizational Relation
Technology and work design in Organizational Relation
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)
 
Tecnologia na sociedade
Tecnologia na sociedade Tecnologia na sociedade
Tecnologia na sociedade
 
Tecnologia
TecnologiaTecnologia
Tecnologia
 
Finding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of ThingsFinding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of Things
 
Technology Vision 2017 infographic
Technology Vision 2017 infographicTechnology Vision 2017 infographic
Technology Vision 2017 infographic
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Making technology work for you

  • 1. Making Technology Work for You http://www.marketwatch.com/story/making-technology-work-for-you-2012-05-31
  • 2. MISSION, KS, May 31, 2012 (MARKETWIRE via COMTEX) -- (Family Features) With technology dominating more and more of people's personal and professional lives, it's easy to lose track of passwords for smartphones, tablets, laptops, desktops and more. In addition, for many people, keeping track of online user names and passwords for various accounts -- email, shopping, social networks, etc. -- has also become a hassle, and therefore an inconvenience. In fact, according to a survey conducted by Norton by Symantec, when given a list of potentially challenging activities, 40 percent of people ranked remembering passwords among one of the top three most difficult tasks. This ranking preceded even balancing a checkbook.
  • 3. That same survey also found that 70 percent of respondents had forgotten at least one password in a single month, which is why for many, opting for an easier-to-remember, though weaker password is preferred. But weak passwords leave accounts and devices more vulnerable to hackers and scam artists, which also plays a role in identity theft. Therefore, it's important to create strong passwords. Creating a Strong Password According to the United States Computer Emergency Readiness Team (US- CERT), following these steps can help you create a stronger password:
  • 4. -- Use a combination of both uppercase and lowercase letters, numbers and special characters when possible. -- Longer passwords are more complicated and thus stronger. If a website allows for passwords between six to eight characters, make sure to take advantage of the longer character allowance. -- Refrain from using personal dates, such as birthdays, or names, such as those of your spouse or child. This information can be discovered by people within your social circle, as well as hackers, so creating codes around words you'll remember makes for stronger passwords, rather than full words or names. -- Do not use the same password across multiple accounts. For example, if you have created a password for online banking, do not use that same password to access your work or personal email account.
  • 5. For more tips on creating a stronger, less vulnerable password, visit http://www.us-cert.gov/cas/tips . Conveniently and Safely Store Your Passwords For those who have difficulty remembering complicated passwords however, new services can lend a hand. Norton Identity Safe -- a free service -- allows you to conveniently save and synchronize your passwords on all your devices, while keeping you safe and secure. The service also allows you to avoid potentially risky websites, and share URLs via email and social networks safely through Identity Safe itself.
  • 6. With Identity Safe you can log in with a single, master password, then access all of your other accounts and passwords through your work or personal computer, or via the app on an iPhone, iPad or Android device. While it may be tempting to create simple passwords to use across multiple devices or accounts, taking the time to create secure passwords can save you from having to sort out fraudulent charges on banking or credit accounts. It can also save you from the time- consuming process of having to recover from the damages of identity theft.
  • 7. To learn more about making technology work for you, visit https://identitysafe.norton.com/?inid=hho_Various_us_ 2012_Jun_IdentitySafe_Matte . About Family Features Editorial Syndicate This and other food and lifestyle content can be found at www.editors.familyfeatures.com . Family Features is a leading provider of free food and lifestyle content for use in print and online publications. Register with no obligation to access a variety of formatted and unformatted features, accompanying photos, and automatically updating Web content solutions.
  • 8. Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=1998312 Wendy MacDonald wmacdonald@familyfeatures.com 1-888-824-3337 ext. 235 http://editors.familyfeatures.com SOURCE: Norton mailto:wmacdonald@familyfeatures.com http://editors.familyfeatures.com/