SHARE
Facebook X Pinterest WhatsApp

Tips for Creating a Strong Password

Check Point Software Technologies Ltd. (NASDAQ: CHKP) recently announced the findings of a ZoneAlarm survey, which revealed that 79 percent of consumers use risky password construction practices, such as including personal information and words. The survey also revealed that 26 percent of respondents reuse the same password for important accounts such as e-mail, banking or […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jan 3, 2011

Check Point Software Technologies Ltd. (NASDAQ: CHKP) recently announced the findings of a ZoneAlarm survey, which revealed that 79 percent of consumers use risky password construction practices, such as including personal information and words. The survey also revealed that 26 percent of respondents reuse the same password for important accounts such as e-mail, banking or shopping and social networking sites. In addition, nearly 8 percent admit to copying an entire password found online in a listing of "good" passwords. Given these numbers, it’s no wonder that 29 percent of respondents had their own e-mail or social network account hacked, and that over half (52 percent) know someone who has had a similar problem.

The first step a hacker will take when attempting to break into a computer or secure account is try to guess the victim's password. Automated programs are also available to repeatedly guess passwords from a database of common words and other information. Once a hacker gains access to one account, almost 30 percent of the time that information can be used to access other sites that contain financial data such as bank account numbers and credit card information. 

"Consumers need to be aware of the importance of passwords and the fact that hackers are getting more and more sophisticated in cracking them," said Bari Abdul, vice president of consumer sales at Check Point. "By creating a unique password for each important account, consumers create the first line of defense against online thieves who can't wait to gain access to critical data for financial gain."

To ensure consumers stay safe online, here are a few tips for creating a strong password.

Tips for Creating a Strong Password - slide 1

Click through for eight tips on creating a strong password from Check Point Software Technologies Ltd.

Tips for Creating a Strong Password - slide 2

Choose a password that is at least eight to 10 characters long. This should be long enough to prevent brute force attacks, which consist of trying every possible combination of a password until the right one is found.

Tips for Creating a Strong Password - slide 3

Make sure your password is difficult for someone to guess. Do not use names of any kind, including your login name, family member's name or a pet's name. Also avoid using personal information such as a phone number, birthday or place of birth.

Tips for Creating a Strong Password - slide 4

Avoid words that can be found in the dictionary. With the availability of online dictionaries, it is easy for someone to write a program to test all of the words until they find the right one.

Tips for Creating a Strong Password - slide 5

Stay away from repeated characters or easy to guess sequences. For example: 77777, 12345, or abcde.

Tips for Creating a Strong Password - slide 6

Choose a password that is a mixture of numbers, letters and special characters. The more complex and random it is, the harder it will be for a malicious person to crack.

Tips for Creating a Strong Password - slide 7

Use fragments of words that will not be found in a dictionary. Break the word in half and put a special character in the middle.

Tips for Creating a Strong Password - slide 8

Choose different and unique passwords for each account.

Tips for Creating a Strong Password - slide 9

Change your passwords often. Even if someone cracks the system password file, the password they obtain is not likely to last long.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.