Featured Pathways

More pathways

Banking Essentials - Part I

This pathway will walk us through the basics of banks, starting with some of the different types and their main functions, then starting to look at the regulation faced by the banks, both before and after the Global Financial Crisis.

Greenwashing

Greenwashing is the act of distributing false information about something being more environmentally friendly than it actually is.

More pathways

Book a demo

Pricing

Ready to get started?

Plans & Membership

Our Platform

Expert led content

+1,000 expert presented, on-demand video modules

Learning analytics

Keep track of learning progress with our comprehensive data

Interactive learning

Engage with our video hotspots and knowledge check-ins

Testing & certification

Gain CPD / CPE credits and professional certification

Managed learning

Build, scale and manage your organisation’s learning

Integrations

Connect Finance Unlocked to your current platform

Featured Content

More featured content

Tackling the Cost of Living Crisis

In this video, Max discusses the cost-of-living crisis currently enveloping the UK. He examines its impact on households as well as the overall economy.

CSR and Sustainability in Financial Services

In the first video of this two-part video series, Elisa introduces us to sustainability. She begins by looking at the difference between sustainability and corporate social responsibility, two terms that can be easily confused.

More featured content

Book a demo

Pricing

Ready to get started?

Featured Pathways

More pathways

Banking Essentials - Part I

This pathway will walk us through the basics of banks, starting with some of the different types and their main functions, then starting to look at the regulation faced by the banks, both before and after the Global Financial Crisis.

Greenwashing

Greenwashing is the act of distributing false information about something being more environmentally friendly than it actually is.

More pathways

Book a demo

Pricing

Ready to get started?

Plans & Membership

Our Platform

Expert led content

+1,000 expert presented, on-demand video modules

Learning analytics

Keep track of learning progress with our comprehensive data

Interactive learning

Engage with our video hotspots and knowledge check-ins

Testing & certification

Gain CPD / CPE credits and professional certification

Managed learning

Build, scale and manage your organisation’s learning

Integrations

Connect Finance Unlocked to your current platform

Featured Content

More featured content

Tackling the Cost of Living Crisis

In this video, Max discusses the cost-of-living crisis currently enveloping the UK. He examines its impact on households as well as the overall economy.

CSR and Sustainability in Financial Services

In the first video of this two-part video series, Elisa introduces us to sustainability. She begins by looking at the difference between sustainability and corporate social responsibility, two terms that can be easily confused.

More featured content

Book a demo

Pricing

Ready to get started?

Book a demo

Pricing

Ready to get started?

Digital Authentication Best Practice

Digital Authentication Best Practice

Ciaran Rooney

20 years: technology, cybersecurity & operations

Now we've laid the groundwork for digital authentication, it's time to advance. Join Ciarán Rooney in this video as he delves into the common password pitfalls, what constitutes a strong password and the future of digital authentication.

Now we've laid the groundwork for digital authentication, it's time to advance. Join Ciarán Rooney in this video as he delves into the common password pitfalls, what constitutes a strong password and the future of digital authentication.

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Digital Authentication Best Practice

12 mins 44 secs

Overview

There are many ways a password can be compromised, including: brute force attack, dictionary attack and phishing. You can avoid many pitfalls by using longer passwords, using the maximum character range, not using common words/patterns and never reusing your password.

Key learning objectives:

  • Understand how your password can be compromised

  • Learn how to create a strong password

  • Indentify how authentication is improving

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Summary

How can passwords be compromised?

  • Brute force attack. This form of attack involves using software to try as many password combinations as possible.

  • Dictionary attack. This involves using software that goes through the dictionary, trying every word until the cybercriminal gains access. Dictionary attacks attempt to bypass the difficulty generated by entropy by skipping lots of guesses that brute force would try.

  • Social engineering and phishing. This is when cybercriminals masquerade as a trusted entity to trick you into willingly providing them with your password and other data. 

What pitfalls can you avoid to stop your password being compromised? 

  • Use longer passwords. 8 characters is now the minimum on most services but try to aim for 12 or more characters.

  • Use the maximum range of characters available, including upper and lower case letters and numbers, symbols, and punctuation.

  • Don’t use only dictionary words or common keyboard patterns. Using Password1,  QWERTY or 123456 are some of the first guesses in a dictionary attack.

  • Never reuse your password. The most common way passwords are compromised is from other data breaches. This means that if you have twenty different accounts, you need twenty different passwords.

What techniques can you use to create a better password? 

You can use the Bruce Schneier Method, which involves taking the first letter from every word in a memorable sentence. The sentence ‘My mother always packed my lunches’ could be used as Mmapml - and you could even substitute symbols or numbers for some letters for even higher entropy. 

Alternatively, you can use the passphrase method. It involves connecting multiple words into a long password. For example, 2Elephants3Cafes&4Plates?

Lastly, you can use a password manager. A password manager can generate long and complex passwords for you, with very high entropy. It can then keep track of a unique password for all the different services you use.

What are the improved authentication techniques? 

Limiting login attempts. A service administrator can limit the number of incorrect password attempts that someone can make before being locked out of the system. 

Multi-factor authentication (MFA). Also known as two-factor authentication, this method requires a user to provide two or more authentication factors before they are granted access to a system. 

Single sign-on and Third-party authentication. This uses the security of another identity platform to act as a form of authentication for a user. You might see this used with a corporate network or an external platform such as Google, Facebook, or Twitter.

 

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Ciaran Rooney

Ciaran Rooney

Ciarán is the Chief Technology Officer of Finance Unlocked Ltd, the company behind the learning platforms Finance Unlocked and Sustainability Unlocked. He has over 20 years of experience in technology, cybersecurity and operations. Ciarán has held the role of CTO of several successful startups, including; busuu, one of the world's largest language learning platforms; the ad tech company Skimlinks, a content monetisation platform for some of the world's largest online publishers; and Swoon, a leading direct to consumer furniture brand. He has also been a technical consultant, a startup mentor, a conference speaker, and the Chair of the PHP UK Conference.

There are no available videos from "Ciaran Rooney"