How to create a strong password and keep your digital profiles safe

If you want to know how to create a strong password and keep your digital profiles safe, then you are on the right blog.

Creating a strong password can be an administrative nightmare as you could end up with numerous accounts with numerous usernames and passwords. The average number of passwords that every online user holds is 26 per person. Gasp! Yes, 26! Keeping track of all of them and ensuring that they are all hack-proof is a juggling act.

What generally tends to happen is that when we don’t know how to create a strong password or feel the one we have is ‘good enough’, we take a blanket approach and either use the same passwords for different accounts or create similar versions of the same password.

Although this approach may seem adequate to you, we  all need to remember that there are hackers “out there” that start with this exact approach when targeting your accounts i.e. they target common passwords or passwords that begin with a capital letter, or ‘admin’, or ‘password’ – yip, people do that. Insane, I know.

How to create a strong password.
Hackers target common passwords

If you want to run a check to see if your passwords have been breached in any way check out this website haveibeenpwned.com.

What hackers are capable of

Hackers are getting smarter and smarter and know that most web users don’t really know how to create a strong password.

They first target the easiest and most commonly used passwords. After that they move onto passwords with the least amount of characters. The more characters you use in a password the harder they are to break. It has been discovered that a password with 7 characters can only take 0.3 milliseconds to crack, but a password with 12 characters, can potentially take up to 200 years to crack.

Think of a safe with a combination lock. If you use your birthdate and a safe cracker starts with that because they have your Identity Number, then no problem to break in right? But if you used a combination of eight numbers that were randomly selected by rolling a dice, then not so easy to break.

Use a combination of letters, numbers and special characters
Use a combination of letters, numbers and special characters

The different types of hacking attacks

We could write a full article on the different types of attacks you may experience but this article is about how to create a strong password. So here is a snapshot of the most common attacks and some tips on how to safeguard against them

  1. Keylogger attacks – the action of recording the key strokes a person is making while typing on their keyboard.
    Tip – use a password manager so your password is auto-filled and not typed.
  2. Brute force attacks – a bot uses common passwords like ‘password’ or ‘1234’ and enters them into your login page. There are multiple attacks over time and if the bot hits the right password, they are into your account.
    Tip – use a lockout policy i.e. if there are for e.g. 3 failed login attempts it locks out anyone from entering a password again until it is reset.
  3. Dictionary attacks – a bot uses all the words from a dictionary and enters them into your login page. There are multiple attacks over time and if the bot hits the right word, they in. Just ask LinkedIn, they had six million passwords hacked in 2012.
    Tip – Don’t use predictable words or common passwords.
  4. Phishing attacks – Hackers masquerade as ‘legitimate’ businesses and get users to open attachments, click on links or download malicious files.
    Tip – Never click on links, download files, or open attachments from unknown senders and always verify requests for payments or updating your bank details by calling your service provider. Contact them directly to verify an email. Also, never email personal or financial information even to those you trust, as your email can still be breached.
Phishing is a common type of hacking attack
Phishing is a common type of hacking attack

How to create a strong password and other tips to protect your digital profile

Password creation:

  1. Use your web browser to create randomly generated passwords. Your favourite web browsers now offer random password suggestions when you create a new account on any platform
  2. Use an excel spreadsheet and then go mad with typing random letters, numbers and symbols into different blocks. Spread your fingers across your keyboard so as to avoid common typing patterns.
  3. Use a combination of letters in both lower-case and capitals and avoid common capitals e.g. using a capital at the beginning of your password.
  4. Use numbers and symbols when creating a new password.
  5. Fourteen characters is ideal and eight characters is the minimum to use when creating a new password.

Protecting your digital profile:

  1. Us a VPN (virtual private network) – the only way to cloak your web activity (including from your ISP) is to connect to a VPN. Here is a list of tried and tested VPN’s from security.org.
  2. Use identity theft protection  – there are some good identity theft protection software packages that you can use like from this local security company.
  3. Two factor authentication – try using two factor authentication for the most sensitive of accounts. You can set this type of security up at authy.com.
  4. Store your files in the cloud. Use cloud based services to store your information. You can use platforms like Google Drive for personal information and for more advanced features you can use a platform like Microsoft Office 365. For more information on the cloud read this blog post – What is the cloud and how to make the most of it.
Make your password as secure as possible
Make your password as secure as possible

How to keep all your passwords safe

Now that you know how to create a strong password, you need to keep them safe.

  1. Avoid using an excel spreadsheet – this method is far too common when making sure all your usernames and passwords are secure. What if you forget that one password or your laptop gets stolen or lost?
  2. Rather use one of these tools to secure all your passwords:

Lastly and most importantly

Your first line of defence is your device (phone, laptop etc.). Make sure you know how to create a strong password for your device that is the most complicated password of all. If someone gets into your device and you have saved all your login details within your browsers well then, game over.

6 Comments

  1. inferior

    Ꮋi to every single one, it’s truly a good for me to visit tһis website, it
    contains important Information.

    Reply
  2. 9

    It’s a shame уou don’t have a donate button! I’d definitely donate to
    this excellеnt blog! I guess for now i’ll settle for bookmarking and adding your RSS
    feed to my Google acϲount. I lοok foгᴡard to new updateѕ and
    will talk about this blog witһ my Facebook group. Talk soon!

    Reply
  3. finnegan

    Your stуle is very unique compared to other people I have read
    stuff from. Many thɑnks fоr posting when you’ve got
    the opportunity, Guess I’ll jᥙst bookmaгk tһis paցe.

    Reply
  4. Chad Cunningham

    Hi Inferior. Thank you for the comment. We will be uploading 3 new blogs today. Look out for them and please share with your friends.

    Reply
  5. Chad Cunningham

    Hi 9. Thank you for the comment. Instead of a donation why not become a RocketNet customer. Use the code #switchisp and you will get free installation as well as a free to use router.

    Reply
  6. Chad Cunningham

    Hi Finnegan. Thank you for the comment much appreciated. We are uploading 3 new blogs today.

    Reply

Submit a Comment

Your email address will not be published. Required fields are marked *

Follow us to the stars

Browse Blog Posts Below

Gamer set-up ideas to keep the latency blues away

Gamer set-up ideas to keep the latency blues away

As a nod of recognition to the release of the new X-box Series X & S, and the PS5 during the 2020 holiday season, we decided to give some gamer set-up ideas to our customers who may be gamers themselves. We have a few seasoned gamers working here at RocketNet, so...

Online safety for kids while using fibre internet

Online safety for kids while using fibre internet

"Online safety for kids is of paramount importance".RocketNet During our downtime we tend to spend more money and time on our luxuries. This includes unwinding with online entertainment. As parents, we may become a bit more relaxed about how much time our kids spend...

How to avoid being tracked online by tech companies

How to avoid being tracked online by tech companies

As human beings, our privacy (including how to avoid being tracked online) and personal boundaries are inexplicably linked to our human dignity, our independence and our freedom. Privacy and the ability to decide who to let in and when, is critical to being able to be...

What is the cloud and how to make the most use of it

What is the cloud and how to make the most use of it

When asked the question ‘What is the cloud?’ you may have looked up at the sky and responded with ‘Well, first of all there isn’t only one, and it depends; it could be cumulus, stratus,  stratocumulus or cumulonimbus?’ But this isn’t a lesson from your primary...

The meaning of LTE and its relationship to 4G internet

The meaning of LTE and its relationship to 4G internet

The meaning of LTE and its relationship to 4G internet Discussing things in the internet space, like the meaning of LTE, can be a little confusing. In this blog post, we unpack the meaning of LTE in as short and as simple a way as possible. When discussing the meaning...

Shares
Share This