Eight Ways to Create Stronger Passwords and Protect Your Accounts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Eight Ways to Create Stronger Passwords and Protect Your Accounts-7 Next

Know that swapping numbers and characters for letters doesn't help.

Another common belief is that substituting numbers or symbols for letters in words will make accounts more difficult to crack. Since attackers use sophisticated automated tools to hack accounts, the systems are able to swap potential characters. When password length is limited, rather than trying to use common words that use substitution, try to choose values that do not sound like words, or look like anything that would be found in a dictionary (t1i2m3e4 is not as strong as Gu83fv1Z). Another option is to create a sentence you will remember, then use the first letter of every word in the sentence. It is also good to keep up with common passwords being used so you stay away from those as well.

Chances are that you or someone you know has had an account hacked. But do you know how the cyber attacker broke through? In order to truly understand how to protect yourself, you need to understand how personal security breaches occur.

In the movies, cyber attackers shuffle through papers and photos for clues, guessing passwords until they pick the right combination and are granted access.

That is not how it happens in real life.

Cyber attackers use tools to automate the process and then conduct mass attacks across the Internet. These tools use dictionaries, lists of common words or passwords, and then try each one in succession. The name of your dog and birthday don't come into play during an automated attack, and therefore don't matter.

Yet there are steps you can take to help keep your accounts from being breached. Security expert James Jardine of Secure Ideas shares simple ways to foil cyber attackers by creating stronger passwords.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.