Image Credit: XKCD 936
With a rise in high profile hacking and an ever-increasing amount of interconnectivity in this world, keeping your data and devices secure is becoming more important than ever. Passwords on your devices and accounts are often the most apparent security measure we all encounter. A weak password is like having a bad lock on your door. It won’t even deter most opportunists. With these two tips, we can strengthen that lock and stop some common attacks.
1. Avoid common passwords and if possible use passphrases: Avoid passwords like swordfish or password. In addition, even if your password requires numbers, uppercase letters, and symbols, you do not need to make a complex garble like p@s5W0rD. Instead, it is often better to use a passphrase. More total characters in a passphrase can make it much more secure against rudimentary brute force methods and if the phrase is uncommon, it can even fool more sophisticated methods. For example, it would be easier and more secure to remember, “Fly Me 2 The Moon!” as a passphrase instead of s1N@7tR@. Try out passwords with Dashlane and see how secure they really are.
2. Better yet, skip multiple passwords: If you are having trouble remembering all your passwords for everything, don’t write them down. Instead, use a reputable password manager. Writing down your passwords and having them on your person makes them vulnerable to loss or theft. Using a password manager like LastPass, allows you to have encrypted and secure passwords generated for all your accounts with only tasking you to remember one master password.
With these two tips, you can start to be bit more secure about your digital information, but never forget that the best thing you can do is to be observant and mindful. If you are still curious and want to know more about cybersecurity or even hacking, we have a few books that could possibly pique your interest:
Hacking for Dummies By Kevin Beaver
Hacking Exposed Malware & Rootkits By Michael A. Davis
Information Security By: Mark Rhodes-Ousley
Network Security: a Beginner’s Guide By Eric Maiwald
Share this Post