Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake.
There are certain specific guidelines you need to follow to choose a safe and secure password. Use the following tips as a "how to" on making your password secure.
1. Your password must be alphanumeric. That simply means a mixture of numbers and letters such as xpf2778z. Why? When a hacker tries to break into a system they often use what are called dictionary or brute force hacks. A dictionary hack is an application that simply uses standard words and word combinations in an attempt to guess your password. For example many computer users use the word "password" as their actual password. A dictionary hack would crack that password in a few moments. Using alphanumeric passwords increases the number of possible password combinations by millions.
2. It should be 6 - 8 characters in length. The longer the password the harder it is for a hacking program to get around. If your password was abc then there are 6 possible password combinations. If your password was abc123 there are now over 720 password combinations possible. If your password was abc1234 there are now almost 6,000 possible combinations. Never, ever use a short password only comprised of letters.
3. Never use personal details in your password. People often use their home address, their age, husband or wives name, their social security number or their date of birth. These are incredibly easy to get access to by either a fellow employee or potential system hacker. Your password needs to be secure and hard to guess and personal details meet neither of these criteria.
4. Do not write your password down anywhere. Keeping a record of your password for somebody to find is as dangerous as keeping a copy of your ATM pin number in your wallet beside your ATM card. Create a memorable password that you'll have no problem recalling. This is not as hard as it sounds and if you jot some password ideas down you'll quickly come up with some good ones. Obviously burn the piece of paper you jotted your ideas down on.
5. Do not use the same password for more than 90 days. Create several variants of the same password and recycle them every 60 - 90 days. This adds an extra layer of security to your data. By recycling your password frequently you make your data 1000% more secure. You'll notice that most large corporates force their employees to change their password every month for this exact reason.
Hopefully these tips will help you choose a password that's both safe and secure and that you'll have some fun creating your new passwords too!
If you need a review of the spam blocker you intend buying then check out Spam-Site.com for spam blocker reviews.
Since its birth, the Internet has grown and expanded to... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
The words Corporate Security may conjure up images of a... Read More
You can detect spyware online using free spyware cleaners and... Read More
Business on the internet is getting down right shameless. This... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Shopping for horse gifts or other gift items on the... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Millions of people make purchases online, but many people are... Read More
Every single time you access a website, you leave tracks.... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
You and I are a lot alike. We are both... Read More
While clicking from site to site on the internet you... Read More
Phishing is a relatively new form of online fraud that... Read More
First I would like to stress I am condoning the... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Over the past few years as the internet has become... Read More
In a word, no - an email message has always... Read More
Despite the current wave of identity theft and corporate security... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Every now and then you can read about a new... Read More
There is nothing more important that password security in world... Read More
Imagine my surprise when I received a phone call from... Read More
No longer are viruses the only threat on the internet.... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
When surfing the Internet you probably take your anonymity for... Read More
Credit card fraud is a growing problem for online businesses... Read More
There is nothing more important that password security in world... Read More
You've seen it in the news - 40 million credit... Read More
Do you really have to know how feeds work? Not... Read More
Identity Theft is one of the most serious problems facing... Read More
Threats we ordinary Web users face online leave us no... Read More
There is no doubt that "how-to articles" have become a... Read More
Have you ever had to call Symantec or McAfee to... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Identity theft is one of the most common criminal acts... Read More
Nowadays more and more people are using a computer. A... Read More
Phishing is a relatively new form of online fraud that... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
By browsing a web page, you could infect your computer... Read More
Before we start, I want to make it clear that... Read More
Computer security for most can be described in 2 words,... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
I got a virus the other day, Thursday I believe... Read More
The first thing people think about when defending their computers... Read More
Before you enter your name, address or any other data... Read More
Ok, you've got a computer, and you get online. You... Read More
Despite the current wave of identity theft and corporate security... Read More
You'd better learn news from media, not from emails, security... Read More
When the Internet first came about, it was realized it... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Internet Security |