Tips for Creating a Strong Password

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Previous Next

Click through for eight tips on creating a strong password from Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (NASDAQ: CHKP) recently announced the findings of a ZoneAlarm survey, which revealed that 79 percent of consumers use risky password construction practices, such as including personal information and words. The survey also revealed that 26 percent of respondents reuse the same password for important accounts such as e-mail, banking or shopping and social networking sites. In addition, nearly 8 percent admit to copying an entire password found online in a listing of "good" passwords. Given these numbers, it’s no wonder that 29 percent of respondents had their own e-mail or social network account hacked, and that over half (52 percent) know someone who has had a similar problem.

The first step a hacker will take when attempting to break into a computer or secure account is try to guess the victim's password. Automated programs are also available to repeatedly guess passwords from a database of common words and other information. Once a hacker gains access to one account, almost 30 percent of the time that information can be used to access other sites that contain financial data such as bank account numbers and credit card information. 

"Consumers need to be aware of the importance of passwords and the fact that hackers are getting more and more sophisticated in cracking them," said Bari Abdul, vice president of consumer sales at Check Point. "By creating a unique password for each important account, consumers create the first line of defense against online thieves who can't wait to gain access to critical data for financial gain."

To ensure consumers stay safe online, here are a few tips for creating a strong password.

More Slideshows:


12 Best Places to Work in 2010 Glassdoor.com names the 12 best tech places to work.

10 Hot Windows Phone 7 Business Apps 10 of the most downloaded apps for Windows Phone 7.


Five Innovations that Could Change the Way We Live, Work and Play IBM predicts five ways that technology innovations will change people's lives.

 

Related Topics : Network Security, Unified Threat Management

 
More Slideshows

UtimacoEVMTokenization0x What's Next After the EMV Migration? Tokenization

Security controls need to be put in place to protect cardholders' confidential information all the way through the transaction process. ...  More >>

infra54-290x195 5 Components of an Enterprise Print Security Strategy

A whopping 70 percent of businesses admit to experiencing one or more print-related data breaches and violations of data protection legislation, which could lead to fines of up to $850,000. ...  More >>

WatchfulSoftwareDLPChallenges0x Data Loss Prevention: 5 Reasons You Need to Step Up Your Game

Sensitive content can be tricky for DLP solutions to identify after it's been saved or sent, as it may contain encryption, common words, vague patterns, or inexact input or context. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date