Skip to content

What is a passphrase — and how does it compare to a password?

Riddle: What works like a password but isn’t one?

Passwords continue to be the most used method for verifying your identity when logging into online services and applications—which isn’t necessarily an issue provided that you handle your passwords properly. Specifically, you must always make sure the complexity and length of your passwords are optimal.

A strong password should be at least 12 characters long and comprise a random combination of numbers, symbols, and uppercase and lowercase letters. While such a password may be difficult to remember, it’s always better to prioritize strength over memorability.

But what if we told you there’s an alternative—a credential that can be stored and managed just like passwords, yet is easier to remember and believed by many to offer even better security? Ever heard of passphrases? That’s the alternative we’re referring to.

What is a passphrase, exactly?

Generally speaking, a passphrase is a sequence of words or a complete sentence used for user authentication. It is, as you can imagine, typically longer than a password, especially because it can include spaces between words.

For example, let’s take a random phrase like ‘no more riddles in this article’—this entire 31-character sequence of words can be used as a passphrase. Of course, since most systems have no limits, your passphrases can be even longer. So, if you want to use one of Shakespeare’s sonnets or what’s written out on the first page of the American Constitution as your passphrase, you are free to do so.

The way you set up a passphrase for your online account is by entering it when a service or application prompts you to create a password. That’s why we said you can manage your passphrases just like you handle your passwords—the difference lies only in the combination of characters you use to log in.

Passphrase vs. password: which one is better?

Passphrases are widely recognized as safer than traditional passwords for several important reasons. Their extensive length and the option to include spaces between words can greatly enhance security against brute-force attacks. Crafting passphrases from meaningful phrases or sentences can significantly improve usability by making them easier to memorize.

In contrast, traditional passwords, with their shorter length and complex character requirements, can be challenging to remember and susceptible to cracking, posing a higher security risk in both scenarios.

When to use a passphrase and when to use a password

For optimal security, we recommend using passphrases since they can be both easy to remember and highly secure. Consisting of multiple words or a full sentence, passphrases are ideal for online accounts where usability and strong security are essential. In contrast, using a traditional password is more suitable in situations requiring shorter, more complex combinations that are challenging for automated tools to crack.

 

How to create a strong passphrase

If you want to create a truly strong passphrase, be sure to combine unrelated words or phrases that are memorable to you but difficult for others to guess. The words can describe anything, such as your favorite color, the type of animal you have, the title of your favorite movie, or the food you dislike—just make sure you select a few and arrange them sequentially.

You can also make your passphrases even stronger by including a mix of uppercase and lowercase letters, numbers, and symbols, just as you would do with passwords.

Where can you securely store and manage your passphrases?

Since the process of creating and using passphrases is similar to that of handling passwords, using a password manager for passphrases is highly recommended. However, it’s important to choose not just any password manager but one that offers features and design ensuring enhanced security and usability.

A good choice would be NordPass due to its encrypted vault, which allows you to securely store your credentials in one safe place. NordPass also offers convenient autosave and autofill functionalities that can simplify and enhance your login experience. If you prefer using passwords, NordPass can further improve your digital life with features like the Password Generator that instantly creates complex passwords and automatically stores them in your vault.

So, give NordPass a try and see what it can do to boost your cybersecurity.

Frequently Asked Questions (FAQ)

How often should I change my passphrase?

Ideally, you should change your passphrase every few months to enhance security. However, if you suspect it may have been compromised or there are any security concerns, you must update your passphrase immediately.

Can a passphrase be too long?

A passphrase can technically be as long as the system allows, but excessively long passphrases may become impractical to remember or type in accurately. So, it’s generally a good practice to balance length with usability when creating a passphrase.

What should I do if I forget my passphrase?

If you forget your passphrase, you should follow the recovery process provided by the service or application where the passphrase is used. This usually includes using account recovery options such as security questions, email verification, or getting in touch with customer support.

How can I remember my passphrases without writing them down?

To remember your passphrases without writing them down, just use a password manager. This will allow you to securely store and organize your passphrases, ensuring they’re accessible whenever needed without compromising your security.

Is it safe to store my passphrases in a password manager?

Storing your passphrases in a password manager is generally safe. However, the level of security can vary depending on the specific password manager you choose. Using a tool like NordPass ensures you receive robust protection, with features designed to keep your passphrases secure and protected against unauthorized access.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Essential guide to end-user security awareness training

End-user security awareness training is crucial for teaching employees about cyber threats. These include phishing attacks and the importance of password security. The need for this education is on the rise. There has been a 29% increase in cyber attacks in the first quarter of 2024 compared to 2023.

Training methods vary, including interactive webinars, gamified modules, and simulated phishing exercises. Each method is suitable for different organizational needs. This guide will discuss what security awareness training involves. It will also cover why it’s necessary and how IT admins can implement it effectively.

What is end-user security?

End-user security involves measures and practices to protect an individual’s computer, data, and network access. It guards against cyber threats and unauthorized access attempts. This security includes password security, antivirus software, and firewalls.

End-user security specifically targets risks arising from human error and individual behaviors. These can lead to security breaches. Unlike network security, application security, information security, and operational security, end-user security focuses on the human factor. This is often the weakest link in corporate security.

The need for end-user security

The need for end-user security is quite obvious and naturally fundamental. Any business that relies on digital resources must prioritize it regardless of size or industry. Implementing security awareness training helps prevent unauthorized access. This access could lead to data breaches, which are costly and damaging to a company’s reputation.

Without end-user security, businesses are more vulnerable to malware and social engineering tactics. While it is impossible to completely protect end users from a social engineering attack, conducting effective security awareness training programs can greatly reduce these risks. These threats often target end users who may not be aware of the sophisticated methods used by cybercriminals.

Organizations without training may see a 30% increase in malicious link clicks. The cost of implementing strong end-user security measures is usually less than the losses from a cyber-attack.

Common threats that end users are facing

End users often represent the front line in cybersecurity, yet they are also the primary targets for many cyber threats. This vulnerability can expose entire networks to significant risks if organizations don’t manage it properly. Here’s a breakdown of the common threats that end users encounter.

Common threats that end users are facing

  • Social engineering: tactics that manipulate users into providing confidential information or making security mistakes. It’s a significant threat because it relies on human error, which can never be eliminated.

  • Phishing attacks: deceptive emails or messages that trick users into revealing sensitive information. It’s the most widespread form of social engineering.

  • Malware: malicious software that an attacker installs on a user’s device without their knowledge. It can steal data, spy on activities, or gain unauthorized access to networks. It can silently cause widespread damage to an organization or the whole supply chain.

  • Ransomware: a type of malware that encrypts data and demands a ransom to restore access. Ransomware attacks often lead to significant financial losses and operational downtime. In 2023, the average cost of each ransomware attack was over $5 million. In total, businesses paid more than $1 billion in ransoms in 2023 for the first time, and experts predict that 2024 will present even greater challenges.

  • Zero-day exploits target unknown software vulnerabilities before fixes are available. End users often suffer from these exploits, as they frequently use vulnerable software. For example, the WannaCry ransomware exploited unpatched Windows systems, impacting users worldwide. Regular updates and patches are crucial for protecting end users.

  • Password attacks: attempts to crack or steal passwords to gain unauthorized access to systems and data. They can lead to breaches of multiple accounts if users reuse passwords.

  • Man-in-the-middle (MitM) attacks are when attackers intercept and possibly alter the communication between two parties. MitM attacks also can lead to data theft.

  • Wi-Fi eavesdropping: intercepting and monitoring data transmitted over poorly secured Wi-Fi networks. This type of attack is serious because it can lead to data breaches of sensitive personal and business information.

  • Drive-by downloads: unintentional download of malicious software to a device, which often occurs when visiting an infected website. The seriousness of these threats lies in their stealth and the ease with which they can infect a system.

  • USB attacks deliver malware through USB devices. These attacks bypass network security and affect the physical security of systems.

Various cyber threats target end users in different ways. However, social engineering is the most common threat. It affects nearly everyone at some point. Complex threats like zero-day exploits happen less often than phishing attacks.

End-user security might not fully prevent sophisticated zero-day exploits. Fortunately, these are rarer than phishing attacks. So, organizations can enhance their security by focusing on phishing awareness training. This significantly strengthens their defense against the most prevalent cyber threats.

Why you need security awareness for your business

The short answer is: you don’t want a devastating cyber attack on your business. Such an attack could cost a huge amount of money or even ruin the business. But let’s break this down into several parts.

Why you need security awareness for your business

Minimize financial risks

Phishing campaigns are the starting point for about 90% of cybersecurity attacks. These lead to data breaches. These incidents can be extremely costly, and the average cost of data breaches is growing every year. The tools for cyber-attacks are also becoming less expensive. A well-structured security awareness training equips employees with the skills to identify and prevent such attacks. This can potentially save the company substantial sums in lost revenue and recovery costs.

Protect your company’s reputation

A single data breach can significantly damage your business’s reputation. This leads to a loss of customers and partners who value data security. For example, the case of 23andMe, which severely damaged its reputation after exposing the DNA data of its customers, underscores the risks. It remains uncertain whether the company will fully recover.

By integrating a comprehensive security awareness program, your business is committed to data protection. This can help maintain customer trust and business relationships.

Comply with regulations

Many industries face strict data protection regulations that charge significant fines for non-compliance. A proper security awareness training program teaches employees to handle sensitive information. This helps them comply with regulations and avoid costly legal issues. It includes finding new partners that value robust cybersecurity like ZTNA.

Reduce human error

Most security breaches come from human error. Implementing ongoing security training can greatly reduce these risks. Programs should cover password security, mobile device safety, and phishing attack recognition. Employees also learn about identity and access management. They become cautious about the data they share.

Secure the supply chain

If your business is part of a supply chain, a breach can impact more than your company. It can affect larger, critical businesses and have unpredictable consequences. A robust security program prevents employees from becoming the weak link in the chain.

Security awareness training can save a lot of money and even your business. It prevents financial losses, protects your reputation, and ensures legal compliance. It also reduces human error risks and secures your supply chain role.

For IT administrators, investing in effective training enhances business security and stability. This investment pays dividends by safeguarding against evolving threats.

How to implement end-user security awareness training

Implementing end-user security training is straightforward but needs careful planning and updates.

How to implement end-user security awareness training

Here are the key steps:

  1. Assess risks. Start by identifying the specific threats your organization faces. These include phishing attacks, malware, or data breaches. Determine which data types and behaviors are most at risk. A SaaS cloud company might be vulnerable to customer data breaches. A manufacturing firm might be exposed through third-party vendors. List the most at-risk data and common compromise methods like social engineering.

  2. Define objectives. Clearly outline the goals of your security awareness training program. Instead of the generic ‘be safe online,’ specify the behaviors and skills employees need to develop. If your company faces diverse cybersecurity attacks, goals might include recognizing signs of a phishing attack and managing password security and access securely. This approach ensures that the security training is focused and measurable.

  3. Choose the right approach. Select training materials and platforms that suit the learning styles and technological skills of your workforce. An interactive quiz with real-life scenarios is often a good choice because it is gamified and relatable. If your team prefers traditional methods, like reading printed materials in Times New Roman on A4 paper, opt for that approach. Choose tools that ensure information is not only presented but retained.

  4. Develop a training schedule. Establish a regular training schedule to maintain ongoing security awareness. Start with mandatory cybersecurity awareness training for new hires, then incorporate monthly security tips via newsletters and weekly reminders on Slack. This helps keep remote employees engaged and aware of the latest cyber threats.

  5. Incorporate engaging content. Use a variety of videos, real-life case studies, interactive quizzes, and gamified elements to make learning both engaging and memorable. This variety helps prevent the training from becoming just another checkbox exercise and enhances employee awareness.

  6. Conduct phishing simulations. Challenge employees with simulated phishing attacks to provide practical experience identifying suspicious emails. For example, in the NordLayer office, QR codes occasionally appear that lead to a page warning against following unknown QR codes.

  7. Measure training effectiveness. After training sessions, assess their effectiveness using quizzes, feedback forms, and by monitoring changes in employee behavior. This is crucial for understanding the training’s impact and identifying areas for improvement. Without this evaluation, programs might become outdated and ineffective.

  8. Update and iterate. As cyber threats evolve, so must your training program. Regularly review and update the training content to include recent cyber incidents and emerging threats, ensuring the program remains relevant and effective.

Overall, this project requires a team, but the investment is worthwhile because it significantly reduces the likelihood of successful cyber-attacks. Remember, no organization is too small for an attack; it can happen even to those who have previously been attacked.

How can NordLayer help?

NordLayer does not offer cybersecurity training but enhances security through robust network protection. After implementing your security awareness program and educating employees, consider the next step of securing your network. NordLayer specializes in network protection solutions, crucial for controlling who can gain access to sensitive areas. This is particularly beneficial for teams that are working remotely, ensuring that computer security is maintained across all connections.

NordLayer also helps IT admins achieve cybersecurity frameworks like Zero Trust Network Access (ZTNA), complementing your employee awareness efforts. With plans starting at $7 per user per month, NordLayer offers an affordable way to bolster your security posture. For guidance on the best plan for your needs, please contact our sales team.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

ESET 獲選為 Gartner® Peer Insights™ 「2024 年客戶之選」中型企業端點保護平台

2024 年 7 月 3 日,全球資訊安全解決方案領導者 ESET 獲選為 Gartner® Peer Insights™「2024 年客戶之選」中型企業端點保護平台1。該殊榮基於 220 位經過驗證的專業用戶評論,重點關注他們對 ESET PROTECT 平台的實際使用體驗。根據報告顯示,96% 的 Gartner Peer Insights 評論給予 ESET 5 星或 4 星評級(其中 60% 5星,36% 4 星)。總體而言,截至 2024 年 6 月,我們的客戶對我們的產品給予 4.6 分(滿分 5 分),其中 90% 的客戶表示他們會推薦我們的產品。

ESET PROTECT 根據真實客戶需求不斷發展,並提供新的功能和模組以應對不斷變化的網絡安全威脅。為了實現最佳的安全防護,ESET PROTECT 採用預防為主的方法,包括:

  • 強大、現代、多層次的端點安全解決方案
  • 擴展保護,包括流動威脅防禦、伺服器安全、雲端應用和郵件安全
  • 先進的威脅防護和 AI 原生檢測技術
  • 全球範圍的遙測和威脅情報
  • 高度可擴展的托管式檢測和應對服務,提供當地支援和 20 分鐘的響應時間

ESET 的首席商業總監 Pavol Balaj 表示:「我們非常自豪能夠獲選為 Gartner Peer Insights『2024 年客戶之選』中型企業端點保護平台。這是對我們在全球為客戶提供優質產品和服務的真實證明。在當今的環境中,保護端點設備對於企業至關重要。能夠看到客戶給予正面的反饋並知道我們的解決方案有助於公司企業的安全,這激勵著我們繼續努力。」

根據報告指出,被置於「客戶之選」象限右上方的供應商獲得 Gartner Peer Insights「客戶之選」殊榮,並標有「客戶之選」徽章。這些受到認可的供應商在整體體驗和用戶興趣和採用率方面均超過市場平均水平。”

1 Gartner「終端保護平台客戶之選」,同行投稿者,2024 年 6 月 28 日

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

ESET 獲選為 Gartner® Peer Insights™ 「2024 年客戶之選」中型企業端點保護平台

2024 年 7 月 3 日,全球資訊安全解決方案領導者 ESET 獲選為 Gartner® Peer Insights™「2024 年客戶之選」中型企業端點保護平台1。該殊榮基於 220 位經過驗證的專業用戶評論,重點關注他們對 ESET PROTECT 平台的實際使用體驗。根據報告顯示,96% 的 Gartner Peer Insights 評論給予 ESET 5 星或 4 星評級(其中 60% 5星,36% 4 星)。總體而言,截至 2024 年 6 月,我們的客戶對我們的產品給予 4.6 分(滿分 5 分),其中 90% 的客戶表示他們會推薦我們的產品。

ESET PROTECT 根據真實客戶需求不斷發展,並提供新的功能和模組以應對不斷變化的網絡安全威脅。為了實現最佳的安全防護,ESET PROTECT 採用預防為主的方法,包括:

  • 強大、現代、多層次的端點安全解決方案
  • 擴展保護,包括流動威脅防禦、伺服器安全、雲端應用和郵件安全
  • 先進的威脅防護和 AI 原生檢測技術
  • 全球範圍的遙測和威脅情報
  • 高度可擴展的托管式檢測和應對服務,提供當地支援和 20 分鐘的響應時間

ESET 的首席商業總監 Pavol Balaj 表示:「我們非常自豪能夠獲選為 Gartner Peer Insights『2024 年客戶之選』中型企業端點保護平台。這是對我們在全球為客戶提供優質產品和服務的真實證明。在當今的環境中,保護端點設備對於企業至關重要。能夠看到客戶給予正面的反饋並知道我們的解決方案有助於公司企業的安全,這激勵著我們繼續努力。」

根據報告指出,被置於「客戶之選」象限右上方的供應商獲得 Gartner Peer Insights「客戶之選」殊榮,並標有「客戶之選」徽章。這些受到認可的供應商在整體體驗和用戶興趣和採用率方面均超過市場平均水平。”

1 Gartner「終端保護平台客戶之選」,同行投稿者,2024 年 6 月 28 日

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

我的健康資訊被盜取了!? 數據洩露後應採取的 8 個步驟

數碼化轉型幫助全球的醫療組織提高成本效益,同時提高患者護理標準。但將醫療記錄數碼化也帶來了一些重大的網絡風險。一旦您的數據儲存在可以通過互聯網存取的系統上,它可能會意外洩露,或被惡意的第三方甚至內部人員讀取。

醫療數據是我們與組織分享的最敏感信息之一,這就是為什麼 GDPR 給予它「特殊類別」地位的原因,意味著它需要進行額外的保護。但是沒有組織是百分之百免於洩露的。如果您發現或懷疑自己處於數據洩露的情況下,保持冷靜,並按照以下步驟有系統地進行操作:

1) 檢查通知
仔細閱讀電子郵件,尋找潛在的詐騙跡象。一些明顯的跡象包括拼寫和語法錯誤,以及對您個人信息的緊急要求,例如要求您「確認」一些詳細信息。此外,務必要檢查「寄件人」的電郵地址,以及是否有鼓勵您點擊鏈結或要求您下載附件。

2) 瞭解發生了什麼
下一個關鍵步驟是瞭解您的風險,究竟哪些信息已被破壞?事件是意外的數據洩露,還是第三方盜取了您的數據?可能已被存取的信息類型是什麼?它是否已加密?如果您的機構未能充分回答這些問題,請給他們打電話以獲取您需要採取下一步的信息。如果仍然不清楚,應該為最壞的情況做好準備。

3) 監控您的賬戶
如果黑客存取了您的個人身份信息(PII)和醫療信息,他們可能會將其出售,或試圖自己使用。無論哪種情況,監控可疑活動都是至關重要的。如果財務信息遭到破壞,請密切關注銀行賬戶和信用卡交易。許多組織提供免費的信用監控,當您的信用報告有任何更新或變更時,它會通知您,這可能表明存在欺詐行為。

4) 報告可疑活動
毫無疑問,您應立即向相關機構報告任何可疑活動或賬單錯誤。最好以書面形式報告,同時通過電子郵件或電話通知您的保險公司。

5) 凍結您的信用卡和銀行卡
根據被盜取的個人信息,您可能需要立即凍結信用卡和銀行卡,這意味著債權人無法存取您的信用報告,也無法批准以您的名義開立任何新的信用帳戶。這將防止黑客以您的名義累積債務,同時考慮重新發行信用卡和銀行卡,一般來說這可以通過您的銀行應用程式輕鬆完成。

6) 更改您的密碼
如果您的登錄信息在數據洩露中受到破壞,相關機構應自動重置它們。但如果沒有,出於安心起見,最好手動更改密碼。這將防止帳戶被接管,尤其是如果您通過雙重身份驗證增強了帳戶的安全性。

7) 保持警覺
如果黑客獲得了您的個人和醫療信息,他們可能會試圖在後續的釣魚攻擊中使用它。這些攻擊可能通過電子郵件、短信甚至實時電話發起。目的是利用被盜信息為對更多個人信息(如財務詳情)的請求增加合法性。請保持警惕,如果黑客試圖以揭露敏感醫療細節要脅您,立即聯繫警方。

8) 考慮法律行動
如果您的數據洩露是由於您的醫療機構的疏忽,您可能有資格獲得某種形式的補償。法律專家應該能夠建議您是否可以提告。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×