<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Passwords Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<atom:link href="https://www.probado.co.uk/category/passwords/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.probado.co.uk/category/passwords/</link>
	<description></description>
	<lastBuildDate>Fri, 03 Jul 2020 09:38:14 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.probado.co.uk/wp-content/uploads/2017/10/favicon-1.png</url>
	<title>Passwords Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<link>https://www.probado.co.uk/category/passwords/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Keeping data secure when working from home</title>
		<link>https://www.probado.co.uk/keeping-data-secure-working-from-home/</link>
					<comments>https://www.probado.co.uk/keeping-data-secure-working-from-home/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 17:00:21 +0000</pubDate>
				<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Remote Working]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Keeping data secure]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2759</guid>

					<description><![CDATA[<p>Keeping data secure is one of the main concerns companies and individuals are faced with when working remotely. With almost 50% of the population now working from home, it is essential that security programs and policies are both capable enough and sustainable enough to ensure that data</p>
<p>The post <a href="https://www.probado.co.uk/keeping-data-secure-working-from-home/">Keeping data secure when working from home</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2741" src="https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
Keeping data secure is one of the main concerns companies and individuals are faced with when working remotely. With almost 50% of the population now working from home, it is essential that security programs and policies are both capable enough and sustainable enough to ensure that data remains safe. Even following a return to normal working conditions, lots of companies may use the success of home working during lockdown to implement a more flexible and accessible remote working policy going forward.</p>
<p>While it is vital that we are keeping data secure throughout the pandemic, it is an ongoing necessity. Ensuring that remote working is as safe as can be for both employees and companies is essential to implementing successful remote working strategies both now and in the future.</p>
<p>For those who have already adopted remote working, robust data security policies may already be in place. However, many companies have not worked this way before, at least not on this scale, or may have only just begun to dip their toes into the remote working pool, meaning that their security best practices may still be in the initial phases of development.</p>
<p>The main thing to consider when taking operations remotely, in any scenario, is training. The key to keeping data secure is ensuring all employees are comfortable with the systems they are using, they understand the importance of security measures and best practices, are able to spot anything that may be suspicious or out of the ordinary, and know how to report or solve any problems that arise.</p>
<p>When employees are out of the office it is vital that they feel comfortable with these processes without the immediate, on-site assistance of their IT teams or line managers. Make sure that all staff have received up-to-date training and are happy with their new remote set up.</p>
<p>Ensure that all devices being used to access company data have up-to-date antivirus software installed on them and automate any updates if you can. Making sure that updates are done as quickly as possible help to patch any holes or weak spots in previous versions and can be essential for preventing a data breach.</p>
<p>A great option for keeping your data secure while preserving remote access is by using a data centre. Data centres are a terrific option and can come with a range of additional security benefits, such as specialist physical 24/7 security. As well as being able to access data remotely, data centres allow for the deployment of firewalls and antivirus software across your entire network. You can read more about data centres here.</p>
<p>Another thing to consider when working remotely is using a secure connection. While it is easier in these current times to avoid public spaces and unsafe public WiFi connections, the security of your connection is still important. Ensure your WiFi is password protected and you can control who has access to the network.</p>
<p>We would highly recommend using a virtual private network (VPN). A VPN is essentially a secure passage for you to access the world wide web. Cybercriminals will look to exploit a range of areas, so it is important that your browsing and online activity is protected.</p>
<p>Keeping data secure needn’t be a worry for your business, our team are still working remotely and are available to help you with any issues that may arise when working from home. Whether you’re struggling to keep the connection or need some advice on how to implement these strategies on a longer-term basis then please get in touch with a member of our team.</p>
<p>The post <a href="https://www.probado.co.uk/keeping-data-secure-working-from-home/">Keeping data secure when working from home</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/keeping-data-secure-working-from-home/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Staying safe on social media</title>
		<link>https://www.probado.co.uk/staying-safe-on-social-media/</link>
					<comments>https://www.probado.co.uk/staying-safe-on-social-media/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 16:47:54 +0000</pubDate>
				<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Staying safe on social media]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2745</guid>

					<description><![CDATA[<p>Social media can be a fantastic place to network, promote your business and products and to share information. However, cybercriminals often look to social media to exploit weak passwords or gain information. Here is our guide to staying safe on social media. Strong Passwords A strong password</p>
<p>The post <a href="https://www.probado.co.uk/staying-safe-on-social-media/">Staying safe on social media</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-2743" src="https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
Social media can be a fantastic place to network, promote your business and products and to share information. However, cybercriminals often look to social media to exploit weak passwords or gain information. Here is our guide to staying safe on social media.</p>
<h2>Strong Passwords</h2>
<p>A strong password is essential for staying safe on social media. Weak passwords can often be the window cybercriminals use to gain access to social media accounts. This means they can access any information posted or stored on the site. Make passwords complex and don’t include personal or widely known information such as your name or office address. Enable multi-factor authentication wherever possible to ensure maximum security. This means having two or more layers of protection, for example a password and an additional PIN number sent to your mobile phone.</p>
<p>Use different passwords for each social media platform. This will ensure that if one account is compromised it will limit the potential risks across other accounts. For more tips on how to create and maintain strong passwords for your business, <a href="https://www.probado.co.uk/password-security-for-smes/">click here</a>.</p>
<h2>Don&#8217;t Share Personal Information</h2>
<p>You wouldn’t stick a poster with all of your bank details on in a busy shop window, so why put them on social media? Lots of businesses are now using social media to help advertise their products and services, which can be a great tool to help get your brand noticed. While it may be easier to tick a box and save your bank details for the next time you run a campaign, we recommend that you do not do this. If for some reason your account is compromised, all of this information could be taken and used elsewhere. It’s better to be safe than sorry!</p>
<p>Be wary of any details you choose to link to your social media accounts. If it isn’t direct contact or banking details, it might be personal details that could be used to guess a password or work out your security questions.</p>
<h2>Privacy Settings</h2>
<p>Privacy settings are there to keep you safe. Most social media sites allow you to decide what information is public or private on your account, including contact details and locations.</p>
<p>We recommend checking your settings regularly to ensure your privacy is respected even when the platform changes its rules. All platforms should inform you if anything changes with their privacy policies, but it is best to keep an eye on it yourself and manage what information is publicly available.</p>
<h2>Keep Antivirus Up-to-date</h2>
<p>Treat social media like you would any other website or app that can be subject to attack by cybercriminals. Make sure your antivirus programmes are up to date on all devices across your network. You may not think antivirus software does very much, but it is constantly running in the background, working hard to keep you safe.</p>
<p>Social media sites can be informative and helpful, but some individuals will use these channels to share fake news and bad links. Using an antivirus software will help protect you from straying into dark corners of the worldwide web.</p>
<p>Social media can be a great platform for businesses; however, there are risks and individuals that exist who will try to exploit these channels. The best way to ensure you and your employees are staying safe on social media is to regularly update training so everyone knows how to spot suspicious activity and is comfortable reporting it. Make sure you have a social media policy in place to make employees aware of best practices while using these channels.</p>
<p>For more information on how to keep your business safe, get in touch with a member of our team <a href="https://www.probado.co.uk/contact-probado/">here</a>.</p>
<p>The post <a href="https://www.probado.co.uk/staying-safe-on-social-media/">Staying safe on social media</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/staying-safe-on-social-media/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What to do if you think you’ve been hacked</title>
		<link>https://www.probado.co.uk/what-to-do-if-you-think-you-have-been-hacked/</link>
					<comments>https://www.probado.co.uk/what-to-do-if-you-think-you-have-been-hacked/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Tue, 21 May 2019 09:11:33 +0000</pubDate>
				<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Hacked]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2537</guid>

					<description><![CDATA[<p>In April 2019 the National Cyber Security Centre (NCSC) published its first UK Cyber Survey which revealed that 42% of Brits expect to lose money to online fraud. Falling victim to hackers can have a devastating effect on your business so it’s important that you and your</p>
<p>The post <a href="https://www.probado.co.uk/what-to-do-if-you-think-you-have-been-hacked/">What to do if you think you’ve been hacked</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-full wp-image-2523 aligncenter" src="https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2019/05/Person_Data_2492x1500-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
In April 2019 the National Cyber Security Centre (NCSC) published its first UK Cyber Survey which revealed that 42% of Brits expect to lose money to online fraud. Falling victim to hackers can have a devastating effect on your business so it’s important that you and your employees are prepared and know exactly what to do if it is suspected that your systems have been hacked.</p>
<p>If you believe any of your accounts have been compromised you should take action immediately and follow these steps:</p>
<h2>Contact your IT Support Team</h2>
<p>If your business is covered under an IT support contract or you have an internal IT department, tell them that you suspect your account has been hacked. They will have procedures to follow in the event of suspected breaches. If you do not have IT security support in place then you should:</p>
<h2>1. Perform antivirus scans on your devices</h2>
<p>Ensure your antivirus software is up to date and perform an antivirus scan on all of your devices. Many breaches occur through malicious software being installed via drive by downloads or by opening malicious attachments in email</p>
<h2>2. Change your passwords</h2>
<p>Change your passwords for any online accounts you may have (do this from a different trusted PC/device). This includes email accounts, social media pages (such as Facebook, Twitter and LinkedIn), online shopping accounts (e.g. eBay and Amazon) and payment gateways (such as Paypal).</p>
<p>The NCSC UK Cyber Survey found that 23.2 million victim accounts worldwide used 123456 as a password! You should always ensure that every password that you use is unique and not easy to guess – this will help to mitigate the scale of a compromise.</p>
<h2>3. Enable 2/Multi Factor Authentication (MFA)</h2>
<p>This is an authentication method whereby the user is only allowed access after successfully giving two or more pieces of evidence to confirm their identity, for example their mother’s maiden name or place of birth. Enabling 2, or MFA, offers a second tier of protection for your account. Even if your password is discovered, a hacker would still need the code provided by your second authentication method to get to your data.</p>
<p>2FA (and the use of unique password methods) will help to protect you against hackers using ‘credential stuffing’ techniques. This type of cyberattack is one of the top threats to web and mobile applications because of the sheer volume of accounts involved. It usually consists of large lists of email addresses and/or usernames, along with the associated passwords, being used to hack into user accounts. This usually happens as a result of a data breach and can be devastating for businesses that fall prey to this type of attack, not least because of the huge reputational risk that comes with it.</p>
<h2>4. Check your accounts</h2>
<p>Many malicious actors will leave back-door methods to enable them to continue to access your information even if you have realised you have been hacked and already changed your details.</p>
<p>The key things to check are:</p>
<p>• Make sure you don’t have any unknown forwarded emails in your account(s)<br />
• Check your email account(s) sent folder – while some malicious users would delete the contents here, some may not<br />
• Make sure your email address hasn’t been changed on any sites that you usually log into online<br />
• Check your ‘forgotton password sections’ haven’t been changed (e.g. phone numbers, secret questions, date of birth)</p>
<h2>5. Notify third parties</h2>
<p>While it may seem like a daunting task, if your account has been hacked, we would recommend informing third parties associated with your account/business. This will ensure they can react appropriately and with caution to potentially malicious emails from your account.</p>
<p>As of 25 May 2018, the General Data Protection Regulation (GDPR) introduced a responsibility for businesses to report certain types of data breaches to the Information Commissioner’s Office. To check if your incident qualifies you can go here: <a href="https://ico.org.uk/for-organisations/report-a-breach/">https://ico.org.uk/for-organisations/report-a-breach/</a></p>
<p>The post <a href="https://www.probado.co.uk/what-to-do-if-you-think-you-have-been-hacked/">What to do if you think you’ve been hacked</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/what-to-do-if-you-think-you-have-been-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Password security for SMEs – why it’s important they can’t be guessed</title>
		<link>https://www.probado.co.uk/password-security-for-smes/</link>
					<comments>https://www.probado.co.uk/password-security-for-smes/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Wed, 20 Mar 2019 11:49:27 +0000</pubDate>
				<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2431</guid>

					<description><![CDATA[<p>How many times a day are you asked to input a password online? Your work email, personal email, online banking account, social media, to name just a few, all require a password and it can be tempting to use the same one for everything. But stop right</p>
<p>The post <a href="https://www.probado.co.uk/password-security-for-smes/">Password security for SMEs – why it’s important they can’t be guessed</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-2439" src="https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop.jpg" alt="" width="2492" height="1850" srcset="https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop-300x223.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop-768x570.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop-1024x760.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop-160x120.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop-81x60.jpg 81w, https://www.probado.co.uk/wp-content/uploads/2019/03/Password-laptop-190x141.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /></p>
<p>How many times a day are you asked to input a password online? Your work email, personal email, online banking account, social media, to name just a few, all require a password and it can be tempting to use the same one for everything.</p>
<p>But stop right there! Using the same password for all your online activity, or one that is easy to guess, carries a heavy risk of cyber-attack. So, SMEs that don’t have adequate password security in place are leaving themselves vulnerable.</p>
<p>In February it was reported that as many as 2.2 billion email accounts had been compromised in what could be the biggest data breach in history, with hackers sharing the leaked passwords and emails on cyber-criminal forums.</p>
<p>Cyber-attacks are an ongoing risk for SMEs and businesses should do all they can to protect their password security.</p>
<p>Cyber attackers use a range of techniques to discover passwords. This includes:</p>
<h2>Searching</h2>
<p>IT systems can be searched for password information that is stored electronically;</p>
<h2>Interception</h2>
<p>Attackers can intercept passwords as they are transmitted over a network;</p>
<h2>Social Engineering</h2>
<p>This is where the attacker uses a variety of techniques, including phone calls and social media, to trick people into revealing their passwords;</p>
<h2>Stealing passwords</h2>
<p>If you store your passwords insecurely then you are leaving yourself vulnerable to attack e.g. passwords written on a note stuck to your computer;</p>
<h2>Manual guessing</h2>
<p>Many people use personal information in their passwords, such as the name of their spouse, child or pet, all of which can be figured out with minimal research on the hacker’s part;</p>
<h2>Key logging</h2>
<p>This is when a person’s keystrokes on a computer, phone or tablet are recorded.</p>
<p>With the array of techniques that attackers use, it’s essential that SMEs have a robust and workable password security policy.</p>
<p>It is advisable to:</p>
<p>• Ban the most common passwords<br />
• Monitor failed logins and train staff to recognise and report suspicious activity<br />
• Never store passwords in plain text format<br />
• Prioritise administrator and remote user accounts</p>
<p>On average people use the same password for four different websites and the average UK citizen has a total of 22 online passwords. That’s a lot of passwords to remember however, there are measures you can put in place to help your staff to remember them.</p>
<p>This includes:</p>
<p>• Only using passwords where they are necessary<br />
• Putting systems in place that allow staff to securely record and store their passwords<br />
• Only asking staff to change their passwords if there is suspicious compromise<br />
• Allowing staff to reset passwords easily and cheaply</p>
<p>You can help staff to improve their password security by:</p>
<p>• Advising against using predictable passwords<br />
• Encouraging them to use different passwords at work and at home<br />
• Making them aware of the limitations of password strength meters<br />
• Putting technical defences in place so less complicated passwords can be used</p>
<p>With cyber attackers becoming smarter and more sophisticated, businesses should also consider Multi-factor authentication (MFA), which adds an extra layer of security that can help reduce the risk of cyber-attacks. You may have already come across MFA through your online banking, where you use a secure key pad on top of your passwords to access your accounts.</p>
<p>In a nutshell, MFA is an authentication method in which the user is granted access only after successfully presenting two or more pieces of evidence (or factors) that they possess on them.</p>
<p>Factors generally used in MFA are:</p>
<h2>• Knowledge &#8211; something only the user knows</h2>
<p>• Password<br />
• PIN<br />
• Phrase etc.</p>
<h2>• Possession &#8211; something only the user has</h2>
<p>• Disconnected Tokens<br />
– Separate device (usually provided by vendor, bank etc)</p>
<p>• Connected Tokens<br />
– Card Readers<br />
– Wireless Tags</p>
<p>• Software Tokens<br />
– Authenticator App</p>
<h2>• Inherence &#8211; something on the user</h2>
<p>• Biometrics<br />
– Fingerprint<br />
– Face<br />
– Voice<br />
– Iris</p>
<p>The post <a href="https://www.probado.co.uk/password-security-for-smes/">Password security for SMEs – why it’s important they can’t be guessed</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/password-security-for-smes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
