© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Industry News / Former Hacker Has 3 Tips For Better Cybersecurity

Former Hacker Has 3 Tips For Better Cybersecurity

  • Author
    Nok Nok News
  • Published
    29 Nov 2022
  • 0 comments
    Join Conversation
Industry News

Kevin Mitnick was a hacker that was eventually charged and prosecuted for wire fraud crimes. However, he left that life behind and began a career as a cybersecurity consultant for clients as prestigious as the US government and as well-known as Microsoft. He used those years of experience as a criminal to show others how to defend themselves against digital intrusions. According to CNBC, he has three important strategies for anyone interested in better cybersecurity.

Disciplined Password Management For CyberSecurity

For anyone that is still relying on passwords, while it may be inconvenient, the best way to increase security while still using these systems is to use “strong passwords.” Strong passwords are random strings of alphanumeric characters, making them impossible to guess.

The best way to handle multiple strong passwords is to use a password management system. Relying on an easy-to-remember or guess password or using the same strong password repeatedly leaves the user vulnerable to password theft.

Upgrade To NextLevel Multi-Factor Authentication

For those who want to take things a step further, switching to multi-factor authentication systems adds extra security layers. Traditional passwords have only one point of access. Producing the correct password grants total access. Multi-factor, as the name implies, adds additional layers of verification.

Multi-factor authentication can use additional variables, such as requiring an extra code inputted that is sent via text over a phone. Or it can eliminate passwords and codes, relying on biometrics such as voice, face, or fingerprint recognition and encrypted passkeys tied to a specific device such as a phone or laptop.

Isolated Devices

For the ultimate in security, a final tip, specifically relating to financial or other confidential data, is investing in specific devices used only for that purpose. This means buying a phone, tablet, laptop, or desktop computer and using only that device to access financial data, store confidential data, or even exclusively log into financial or confidential accounts on these devices.

While this is a more drastic method, having dedicated devices for protected data increases security by 98%. If these devices are never used for everyday computing activity and only ever activated and utilized for important data-related interactions, the odds of theft are dramatically lower. However, this does require more time and investment.

For most people, the more practical system is upgrading cybersecurity to a multi-factor authentication system, such as the standardized protocols used and offered by the FIDO alliance. If you’re interested in using the FIDO protocol and moving to a passwordless authentication system, read here to learn more.

Nok Nok News

Related Posts

The US Government Now Wants Phishing Resistant MFA
Industry News

The US Government Now Wants Phishing Resistant MFA

The Government Is Now Turning To The Private Sector For Better Cybersecurity
Industry News

The Government Is Now Turning To The Private Sector For Better Cybersecurity

The US Government Is Ramping Up Cybersecurity Precautions
Industry News

The US Government Is Ramping Up Cybersecurity Precautions

Intuit Announce New Advances In Digital Financial Management
Industry News

Intuit Announce New Advances In Digital Financial Management

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語