CyberSecurity

8 Tips for a Stronger Password

8 Tips for a Stronger Password
[cz_image id=”cz_46269″ image=”12312″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_91210″ cz_title=””]Although there are many exciting biometric password technologies emerging, the good old-fashioned password is still as important as ever; possibly even more than ever before. Many people still have the feeling that it’s unlikely their passwords will be compromised, but in reality, all of us are at risk. Your password is your first line of defense against hackers. That’s why having a strong password is so important.

 

Your Guide to Creating a Strong Password

1. Don’t Make it Personal

Birthdays, anniversaries, children’s and pet’s names as well as a series of numbers (such as 54321) are not good options. While these details are all easy to remember, they don’t belong in your passwords list. Passwords containing personal details can be easily guessed by someone you know and even by hackers who don’t know you at all. This is because hackers user publicly available software which allows them to use a “Brute Force” method to check all possible passwords until the correct one is found. You make their job a lot easier if they already know basic formula used to create the password. What’s the first thing they’re checking for? Passwords containing the items listed above.

 

2. Don’t Use Real Words

Passwords which contain full and correctly spelled words in any language are particularly vulnerable to a dictionary, brute-force, rainbow or many other effective methods of attack. Many people will use words from another language not native to their geographical location as their “bullet-proof” strategy. This technique is no more secure than if they were to use words from their native language. Dictionary attacks exploit most words from languages across the world.

 

3. Use a Combination of Letters, Numbers and Symbols

One effective technique is to choose a password and replace some of its letters with numbers, special characters and both uppercase and lowercase letters. For example, if your password contained the word “Padlock,” simply spelling it out could leave you at risk, but using characters which are uppercase and lowercase as well as symbols and numbers to spell the word will make it much more difficult to guess. For example, the password “Padlock” could be converted to “p@dL0cK,” which contains all of the previously listed items.

 

4. Longer is Stronger

The longer the password, the better. Your passwords should be at least 8 characters, but ideally as long as 16 characters.

 

5. Use a Unique Password for Each Login

Using a single password for all of your accounts makes remembering your logins easy, but is not a good idea. Research shows that 60% of users use the same password for most, if not all of their online accounts. This strategy makes it easy for the user, but if someone with bad intentions gains access to one of your passwords, they have access to ALL of the accounts which share that same password. Using a unique password for each account will limit a hacker’s access to just one account in the event of a breach.

 

6. Consider Using a Passphrase

Using a pass phrase will help you create longer, more complex passwords that are easy for you to remember, and more importantly; harder for hackers to guess. A passphrase is basically just a series of words that make a long password. For example, if you like ballroom dancing, your passphrase could be “!Like2ba11roomD@nce.” That’s something that is easy to remember, but means nothing to anyone but you.

 

7. Use a Password Manager

If you’re creating long, complex passwords and using unique passwords for each account, you are going to have a hard time remembering them. That’s why it’s a good idea to use a password manager so that you’re not discouraged from using strong passwords. Password managers store your passwords for you so that they are all available to you in one place. The key is having a very strong master password, which you use to gain access to the rest of your passwords. A few popular options are DashLane, Keeper and LastPass. Each option offers a desktop and mobile application.

 

8. Enable Two-step Verification

Whenever possible, enable two-step verification. Many popular websites have this capability, which basically requires you to login two different ways to gain access. This is especially good to use for your email accounts or any other account with private information, and is relatively easy to set up.

 

Concerned about the security of your business’ networks? Les Olson Company offers expert Network Security services. Learn how we can help protect your business.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

Related Posts