Research showed that 23 million account holders used the password “123456” in 2021. We get the appeal – it’s short, easy to remember and it’s one less thing you have to think about in your busy life. However, this is not a strong password to protect your digital identity.
Stop and consider it for a minute. Passwords are what keep your information protected and out of nefarious characters’ hands. Is “123456” really what you want between your private data, like bank information, and a hacker?
Don’t fret – we have good news! Below are ten Dos and Don’ts to help build an arsenal of crafty passwords that will be sure to provide you with the safety, security and protection you need.
How to Create a Strong Password:
DO
- Make your password long. 12-14 characters are recommended.
- Use a mix of characters like capitalization, symbols and numbers.
- Use a different password for every account. We mean every.
- Never share your password with anyone.
- Change it every 3 months.
DON’T
- Don’t use common substitutions (0 for O, or 1 for I, etc.).
- Don’t use real words (e.g. words that can be found in the dictionary).
- Don’t use important numbers like birthdays, anniversaries or your address.
- Don’t use the name of someone or something close to you (kids, spouses, pets etc.).
- Don’t state the obvious. No 12345678, qwerty or password!
Password Management
Did we say a different, strong password is needed for every account? Yes! The reason is simple: once a hacker has access to one account, he or she will have access to others if the password is the same.
How are you supposed to remember all those different passwords, especially if you can’t use your dog’s name or your birthday? One potential solution is to use a password management tool. This will store your credentials in one secure location using encryption. You no longer have to memorize logins or passwords and you can say goodbye sticky notes all over your desk.
Before making your choice, do thorough research on password managers so you’re familiar with the security features and the reputations of each. Some password managers offer free trials with the option of eventually upgrading to a paid plan.
1. Never Share Your Password
Nobody except you should ever know your password. Never email your password or store it in a document or write it down on paper. your password should only be in your head and in a hash on the system you’re logging into. Here is a list of some of the people to whom you should never, ever give your password:
- Tech support
- Cops
- Your friend who is actually cool
- A judge
- Mom
- Someone asking for it in an email
- Your boss
- Famous hacker Kevin Mitnick
- Anyone
Your password is what makes you accountable for the actions taken under your account. Socially engineering a password out of someone is often much easier than “hacking” their account. Most *ishing schemes trick you into giving up your password in some way or another. Why go to the trouble of blowing the safe if you can have the bank manager open it up for you?
2. Create a Strong Password
Not any password will do, and the reason why relates to how passwords are cracked. If a person were trying to guess your password, they might try ten or so passwords a minute, if they’re fast. A computer can guess much, much faster. So how many permutations does it take to get your password? Here are three key factors:
- Length. Each character increases the complexity. This is why passwords have a small rule of 8 characters.
- Character sets. Each character set has a certain number of permutations. There are 26 lowercase letters. but only 10 digits (0-9), so you can see how “potato” is more secure than “536871”. from the perspective of a machine running through different combinations of characters.
- Common words. Brute force isn’t the only method to crack a password. A computer can run a “dictionary attack” against a password very quickly, testing for all real words, of which there are few. compared to the huge number of character permutations possible. All the sudden “potato” isn’t that great of a password after all. Read our post on brute force attacks for more information.
Your password should be a combination of at least both upper and lowercase letters. and a number (62 unique, reusable characters, with 8 characters in the password means 62 to the 8th power, or 2.1834011e+14 possible combinations). Include a special character to increase complexity, but make sure that character is supported by the mechanism you’re using, as some are not. Finally, you can find any number of password generators online. which can generate complex passwords. But you have to remember this. And when you get down to step 5, having separate passwords for every account can be too much to ask with 18 character generated passwords.
3. Set a Reminder to Change Your Password
Some services need regular password changes, while some do not. If they don’t, it’s always a good plan to change your password anyway. This step is about reducing the window of damage. Going back to Zuck, if his password was obtained in 2012, it has no business still being in use in 2016. A simple reminder every six months or even a year would have prevented this old data breach from compromising anything. The more often you change your password. the smaller the window of a compromised password being worthwhile. This is why high security systems use generated numbers that change every few minutes as part of their authentication model. Changing your password on a regular basis may seem annoying. but it’s nothing compared to dealing with a compromised account, identity theft, or credit card fraud.
4. Don’t Reuse Passwords
Alternating between passwords doesn’t have the same effect as changing them to something new each time. Once a password is compromised, it can be exploited at any point in time, even years later, as Zuckerberg found out. Reusing a password re-opens the vulnerability window for that password.
5. Different Site, Different Password
This is the one Zuck really got nailed on. Limiting the scope of your password prevents a compromised password from exploiting multiple areas. Even adding a section somewhere in your password like “fb” for Facebook (eg: BuFFDuD3fb) will prevent most cross-site compromises, because once the attacker realizes the same password won’t crack the site, they would then have to manually start guessing at differences, without knowing if it’s an entirely different password altogether. The full effect of the LinkedIn data breach has likely not been seen yet. As email/password combos are tried at other sites, users who relied on a single, static password will be compromised. This ripple effect to other systems follows major breaches every time.
6. Secure Your Reset Options
This step protects you against people, rather than computers, trying to hack your account. Be thoughtful with how your password can be reset. Security questions and answers should not be information that is publicly available, easily searchable or widely known to people who know you. Many people’s accounts are hacked by people they know in real life. If you have an email account where a password reset request will be sent, make sure you have sole access to that account and that it too has a strong password.
7. Use a Password Manager
You can use a password manager to store your passwords for you. The major browsers all have password storage systems. while cloud options like LastPass work from any computer with internet access. There are pros and cons to this method:
Consider that LastPass suffered a data breach in 2015 where sensitive information was acquired by hackers. The encrypted master password was not compromised, but much other important information was. The important thing to remember is that password managers are not magic. you’re outsourcing the protection of your passwords to someone else.
8. Use Two-Factor Authentication
The one account of Zuckerberg’s that didn’t get breached was his Instagram, and that’s because “Instagram’s security systems prevented that account from being accessed.” This could refer to a few things, but likely means the two-factor authentication (2FA) Instagram set up in February of this year.
One of the most important mechanisms available, 2FA, as its name implies, prevents the compromise of a single authentication factor (the password) from compromising the account. The mechanism works by requesting the traditional login information, then sending a confirmation to a device, usually a smartphone, such as a text, phone call, or in-app security verification screen. Only the authorized person would have the smartphone and could then accept or reject the authentication requests as necessary. More advanced mechanisms can need bio-authentication. such as a fingerprint swipe, which prevents lost or stolen phones from being used to falsely issue confirmations. Most cloud apps offer 2FA now, with many traditional applications following suit. It’s worth taking a few extra seconds every time you login to know that even if your password is hacked, nobody can access your accounts.
9. Don’t Leave Windows Open
There’s a classic cartoon gag where one of the characters struggles for a long time to pick a lock on a door while the other character just goes in through an open window. Don’t let this be the case with your data. Consider whether there are other accounts with access to the same information you’re protecting. Are they as secure as yours? What about integrations? Did you try out that hilarious face swapping app that requested access to your Twitter and Facebook and photos? Does it still have access to your account? Most cloud services will let you track what third party integrations have access and remove whatever is unnecessary. If you’re using a public computer, be sure to close the entire browser process when you’re done. Failure to do so could leave your session cookies available for the next person, who wouldn’t even need to log in to access your information.
Digital identity management is in that weird place between new enough that many people don’t bother with it, and established enough that sophisticated attacks seek to exploit it. A username and password may seem like a bit of data you toss into the cloud whenever. but the consequences of compromise are very real, and can be legal, financial and personal.
Or they can be funny, like when the official NFL Twitter account was hacked to make exaggerated claims of Roger Goodell’s death. According to the hackers, they “got the NFL’s Twitter password by hacking the email account of an employee who handles socialmedia.” Take care of your password like you would your driver’s license or debit card. Following the steps we’ve outlined here will help protect you against the most common types of account hacks, but security is a habit, and keeping it in the forefront of your mind when using the internet will always pay off.
Why Choose eSource Software?
eSource Software is among the leading software outsourcing companies in Malaysia. Providing quality software outsourcing services, catering to clients across the globe. for projects of any size and scope.
Get in touch today to learn more about our services!
Contact us:
eSource Software, 17-01, Kapitan Square, Buckingham Street, 10200 George Town, Penang, Malaysia.
Call : (006) 012-4377440
Email : esourcetechnology@gmail.com
Website : www.esource-malaysia.com
Malaysia Cities: Alor Setar, Semporna, Putrajaya, Sandakan, Kuantan, Johor Bahru, kedah, Alor Setar, Perlis, Kuala Terengganu, Kota Bharu, Miri, Kuching, Kota Kinabalu, Ipoh, Perak, Malacca, Negeri Sembilan, Langkawi, George Town, Penang, Pahang, Selangor, Terengganu, Kuala Lumpur, Sabah, Sarawak, Labuan.
Mobile App Penang | Mobile App Kuala Lumpur | Mobile App Selangor | Mobile App Johor Bahru | Mobile App Singapore | Software Pahang | Software Sabah | Software Sarawak | Software Malaysia | Software Kuala Lumpur | Software Singapore | Software Brunei | Software Selangor | Software KedahLondon | New York | Hong Kong | Singapore | Toronto | Frankfurt | Dubai | Taipei | Brussels | Tokyo | Chicago | New DelhiBeijing | Sydney | LosAngeles | Vancouver | Paris | Copenhagen | Berlin | Miami | Rome | Boston | Seoul | ViennaMumbai | Warsaw | Shanghai | San Francisco | Dublin | Philadelphia | Las Vegas | Budapest | Montreal | Barcelona | Abu Dhabi | MunichDallas | Manchester | Bangalore | Amsterdam | Lisbon | Madrid | Prague | Geneva | Milan | San Diego | Auckland | HamburgRiyadh | Saint Petersburg | Rio de Janeiro | Melbourne | Manila | Moscow | Sao Paulo | Zurich | Chengdu | Stockholm | Hyderabad | OsloDenver | Buenos Aires | Helsinki | Luxembourg | Orlando | Washington, D.C. | Atlanta | Johannesburg | Bangkok | Birmingham | Brisbane | CalgaryTianjin | Sofia | Athens | Kyoto | Wenzhou | Guadalajara | Phoenix, Arizona | Bucharest | Houston | Nanjing | Chennai | KyivNairobi | Jeddah | Shenzhen | Busan | Cape Town | Ho Chi Minh City | Mexico City | Jakarta | Cairo | Guangzhou | Dhaka | LagosOsaka | Istanbul | Kuala Lumpur | Zagreb