Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake.
There are certain specific guidelines you need to follow to choose a safe and secure password. Use the following tips as a "how to" on making your password secure.
1. Your password must be alphanumeric. That simply means a mixture of numbers and letters such as xpf2778z. Why? When a hacker tries to break into a system they often use what are called dictionary or brute force hacks. A dictionary hack is an application that simply uses standard words and word combinations in an attempt to guess your password. For example many computer users use the word "password" as their actual password. A dictionary hack would crack that password in a few moments. Using alphanumeric passwords increases the number of possible password combinations by millions.
2. It should be 6 - 8 characters in length. The longer the password the harder it is for a hacking program to get around. If your password was abc then there are 6 possible password combinations. If your password was abc123 there are now over 720 password combinations possible. If your password was abc1234 there are now almost 6,000 possible combinations. Never, ever use a short password only comprised of letters.
3. Never use personal details in your password. People often use their home address, their age, husband or wives name, their social security number or their date of birth. These are incredibly easy to get access to by either a fellow employee or potential system hacker. Your password needs to be secure and hard to guess and personal details meet neither of these criteria.
4. Do not write your password down anywhere. Keeping a record of your password for somebody to find is as dangerous as keeping a copy of your ATM pin number in your wallet beside your ATM card. Create a memorable password that you'll have no problem recalling. This is not as hard as it sounds and if you jot some password ideas down you'll quickly come up with some good ones. Obviously burn the piece of paper you jotted your ideas down on.
5. Do not use the same password for more than 90 days. Create several variants of the same password and recycle them every 60 - 90 days. This adds an extra layer of security to your data. By recycling your password frequently you make your data 1000% more secure. You'll notice that most large corporates force their employees to change their password every month for this exact reason.
Hopefully these tips will help you choose a password that's both safe and secure and that you'll have some fun creating your new passwords too!
If you need a review of the spam blocker you intend buying then check out Spam-Site.com for spam blocker reviews.
If you are a parent, as am I, I think... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Since its birth, the Internet has grown and expanded to... Read More
I am the victim of an internet scam. It is... Read More
We all get the odd virus now and then, but... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
At this point, if you've got the whole "turning the... Read More
Despite the current wave of identity theft and corporate security... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Well, if that would have been said to me by... Read More
Only the top spyware removers are successful at detecting and... Read More
By browsing a web page, you could infect your computer... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Nobody wants to pay to remove spyware. At the very... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Every single time you access a website, you leave tracks.... Read More
With the advent of the World Wide Web, a whole... Read More
Have been an Internet user for more than 9 years,... Read More
During the release of a new software product specialized to... Read More
Huge number of spyware software applications are available in the... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Spyware is the most troublesome software to appear on the... Read More
Identity Theft is one of the most serious problems facing... Read More
In a word, no - an email message has always... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Every now and then you can read about a new... Read More
Whether we like it or not, we are all living... Read More
You may not realize it, but as you are surfing... Read More
As soon as almost all computer users already got used... Read More
To blog or not to blog? Well, why not? Lots... Read More
In recent days, I was one of the unfortunate persons... Read More
Ebay is a great site and is used by many... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Computer security for most can be described in 2 words,... Read More
Despite the current wave of identity theft and corporate security... Read More
Every now and then you can read about a new... Read More
These six ways to prevent identity theft offer you valuable... Read More
Spyware is software that runs on a personal computer without... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
You've seen it in the news - 40 million credit... Read More
You can detect spyware online using free spyware cleaners and... Read More
A few nights ago I received an email from "2CO"... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
This really chapped my lips...I recently bought a new computer.... Read More
You'd better learn news from media, not from emails, security... Read More
At this point, if you've got the whole "turning the... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Only the top spyware removers are successful at detecting and... Read More
Have you ever had to call Symantec or McAfee to... Read More
Millions of people make purchases online, but many people are... Read More
Today,on most internet user's computers, we have the ability to... Read More
Over £5 billion pounds was spent on online shopping in... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
The money being spent online is steadily growing. With billions... Read More
Whether we like it or not, we are all living... Read More
The top five online scams on the Internet hit nearly... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
P C. owners are constantly at risk from attacks by... Read More
This is the second in a series of articles highlighting... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Internet Security |