Here’s a quick test – what do these seemingly random alphanumerical groupings have in common?
That is a list of the Top Ten Passwords used in 2018. Recognize any of these? If you don’t, you’re not necessarily in the clear, but your chance of becoming compromised or hacked is far less than someone who uses one of these passwords. If you do recognize these, you’re certainly testing your luck.
These days, creating and remembering passwords has become increasingly more challenging. If we had only one device that required a password, we could probably manage it quite easily. But with every device we use, most programs we need to do our jobs, and sites that require you to change your password every few months, it is estimated that the average person must memorize up to 191 different passwords. No wonder we often choose to take shortcuts!
The problem is, over 80% of hacks are due to compromised credentials, otherwise known as stolen username and password information that are often traded on the dark web. In fact, in one month alone in 2018, Microsoft blocked 1.3 million attempts to steal password data, which would have led to dangerous phishing attacks, and other hacking attempts.
These harrowing statistics are why you hear the recommendations:
Pay attention to that last stat: 50% of all attacks involved the top 25 most used passwords. See what I meant when I said if you recognized anything on that list you’re testing your luck?
Following all these rules and regulations, you’ll end up with passwords that are about 16-characters long, impossible to memorize, and, unfortunately, are still completely hackable (much more difficult, of course, but where there is a will, there is a way). So, what do we do now?
The first shortcut is a password manager. You can store all your passwords in one place. This makes remembering all your passwords much easier, but there is one challenge. The password manager is also protected by a password. If you’re utilizing a software like this, make sure that this password is especially complex, so that hackers aren’t even tempted, especially in the case of a brute force attack. If possible, turn on multi-factor authentication, especially on your password manager.
Many sites utilize multi-factor authentication. This extra layer of protection connects to your phone, email, or other authentication source, rather than relying solely on a password. We recommend enabling multi-factor authentication wherever possible. Only caveat here is make sure your secondary authentication source is equally secured with a strong password. No sense in double protecting yourself with a wide-open source.
Random Password Generators
These sites come up with secure passwords for you, but are typically a random jumble of letters, number, and symbols that are darn near impossible to memorize. If you’ve got a strong memory, this might be a good starting point, but if you’re like most of us this may be more challenging than it’s worth.
How to craft the best password
Use a “Password Phrase” in place of random letters, numbers and symbols. Create something that’s easy for YOU to remember, but has no meaning to anyone else. For example I<3Fh@ck3rs43v3r!. Breaking this down, you get:
Easy for you to remember because you understand the phrase, but difficult for a hacker to decipher because it’s not real words. There’s no time like the present to get started and change your easy-to-hack passwords to something safer, because it’s always better to be safe than sorry.
Work at creating passwords that will be difficult to hack. Make sure to change them regularly. Never write them down, (especially on a Post-it Note stuck to your computer!). But most of all, make passwords an important part of your life. Don’t consider them a nuisance or a thorn in your side. Make a game out of creating passwords. Challenge yourself to be more creative each time you create one. Beat the hackers at their own game by making your password too time intensive to try and crack, and you’ll reduce your chance of your information showing up on the dark web. Worried about your information already being available due to past weak password use? Contact us. We’ll run a scan that reveals your vulnerabilities.
Written by: Emily Reynolds
August 1st, 2019
Posted In: Uncategorized