How to create a strong password and keep your digital profiles safe

If you want to know how to create a strong password and keep your digital profiles safe, then you are on the right blog.

Creating a strong password can be an administrative nightmare as you could end up with numerous accounts with numerous usernames and passwords. The average number of passwords that every online user holds is 26 per person. Gasp! Yes, 26! Keeping track of all of them and ensuring that they are all hack-proof is a juggling act.

What generally tends to happen is that when we don’t know how to create a strong password or feel the one we have is ‘good enough’, we take a blanket approach and either use the same passwords for different accounts or create similar versions of the same password.

Although this approach may seem adequate to you, we  all need to remember that there are hackers “out there” that start with this exact approach when targeting your accounts i.e. they target common passwords or passwords that begin with a capital letter, or ‘admin’, or ‘password’ – yip, people do that. Insane, I know.

How to create a strong password.
Hackers target common passwords

If you want to run a check to see if your passwords have been breached in any way check out this website haveibeenpwned.com.

What hackers are capable of

Hackers are getting smarter and smarter and know that most web users don’t really know how to create a strong password.

They first target the easiest and most commonly used passwords. After that they move onto passwords with the least amount of characters. The more characters you use in a password the harder they are to break. It has been discovered that a password with 7 characters can only take 0.3 milliseconds to crack, but a password with 12 characters, can potentially take up to 200 years to crack.

Think of a safe with a combination lock. If you use your birthdate and a safe cracker starts with that because they have your Identity Number, then no problem to break in right? But if you used a combination of eight numbers that were randomly selected by rolling a dice, then not so easy to break.

Use a combination of letters, numbers and special characters
Use a combination of letters, numbers and special characters

The different types of hacking attacks

We could write a full article on the different types of attacks you may experience but this article is about how to create a strong password. So here is a snapshot of the most common attacks and some tips on how to safeguard against them

  1. Keylogger attacks – the action of recording the key strokes a person is making while typing on their keyboard.
    Tip – use a password manager so your password is auto-filled and not typed.
  2. Brute force attacks – a bot uses common passwords like ‘password’ or ‘1234’ and enters them into your login page. There are multiple attacks over time and if the bot hits the right password, they are into your account.
    Tip – use a lockout policy i.e. if there are for e.g. 3 failed login attempts it locks out anyone from entering a password again until it is reset.
  3. Dictionary attacks – a bot uses all the words from a dictionary and enters them into your login page. There are multiple attacks over time and if the bot hits the right word, they in. Just ask LinkedIn, they had six million passwords hacked in 2012.
    Tip – Don’t use predictable words or common passwords.
  4. Phishing attacks – Hackers masquerade as ‘legitimate’ businesses and get users to open attachments, click on links or download malicious files.
    Tip – Never click on links, download files, or open attachments from unknown senders and always verify requests for payments or updating your bank details by calling your service provider. Contact them directly to verify an email. Also, never email personal or financial information even to those you trust, as your email can still be breached.
Phishing is a common type of hacking attack
Phishing is a common type of hacking attack

How to create a strong password and other tips to protect your digital profile

Password creation:

  1. Use your web browser to create randomly generated passwords. Your favourite web browsers now offer random password suggestions when you create a new account on any platform
  2. Use an excel spreadsheet and then go mad with typing random letters, numbers and symbols into different blocks. Spread your fingers across your keyboard so as to avoid common typing patterns.
  3. Use a combination of letters in both lower-case and capitals and avoid common capitals e.g. using a capital at the beginning of your password.
  4. Use numbers and symbols when creating a new password.
  5. Fourteen characters is ideal and eight characters is the minimum to use when creating a new password.

Protecting your digital profile:

  1. Us a VPN (virtual private network) – the only way to cloak your web activity (including from your ISP) is to connect to a VPN. Here is a list of tried and tested VPN’s from security.org.
  2. Use identity theft protection  – there are some good identity theft protection software packages that you can use like from this local security company.
  3. Two factor authentication – try using two factor authentication for the most sensitive of accounts. You can set this type of security up at authy.com.
  4. Store your files in the cloud. Use cloud based services to store your information. You can use platforms like Google Drive for personal information and for more advanced features you can use a platform like Microsoft Office 365. For more information on the cloud read this blog post – What is the cloud and how to make the most of it.
Make your password as secure as possible
Make your password as secure as possible

How to keep all your passwords safe

Now that you know how to create a strong password, you need to keep them safe.

  1. Avoid using an excel spreadsheet – this method is far too common when making sure all your usernames and passwords are secure. What if you forget that one password or your laptop gets stolen or lost?
  2. Rather use one of these tools to secure all your passwords:

Lastly and most importantly

Your first line of defence is your device (phone, laptop etc.). Make sure you know how to create a strong password for your device that is the most complicated password of all. If someone gets into your device and you have saved all your login details within your browsers well then, game over.

1 Comment

  1. inferior

    Ꮋi to every single one, it’s truly a good for me to visit tһis website, it
    contains important Information.

    Reply

Submit a Comment

Your email address will not be published. Required fields are marked *

Follow us to the stars

Browse Blog Posts Below

Starlink from SpaceX can bridge the digital divide

Starlink from SpaceX can bridge the digital divide

Starlink is on the brink of providing an upgrade to the way the global economy accesses the internet as we know it. With a first of its kind satellite mesh-network system Starlink is set to provide internet to even the most remote parts of the world. A project...

Spectrum Auction. What is that and how does it work?

Spectrum Auction. What is that and how does it work?

Telecommunication companies cannot operate as they please. These companies, like RocketNet, need to receive a license from ICASA (Independent Communications Authority of South Africa) to operate and use designated frequencies. These frequencies, sold on a spectrum...

5G. The Evolution Of Speed and Surveillance

5G. The Evolution Of Speed and Surveillance

One can only begin to imagine the possibilities of 5G network connectivity when one has a more in depth understanding of how network or mobile connectivity has evolved to get to the point where it is. To begin to understand 5G let’s take a dive into the world of...

Biggest Tech Companies by Market Capitalisation, Our Top 5

Biggest Tech Companies by Market Capitalisation, Our Top 5

There is a good chance that you are reading this article on a device that was designed and developed by one of the world’s biggest tech companies. Even if you are not, you do not have to be a gambler to make a bet that at some point in your life you have used a...

Smart homes in South Africa. The possibilities

Smart homes in South Africa. The possibilities

You are in a rush as you leave your house in an attempt to make your flight on time. You forgot to close the garage door and switch off the lights inside the house, but it is too late to go back home. Simple solution, you open your home automation app to access your...

Cryptocurrency, decoding the meaning

Cryptocurrency, decoding the meaning

Cryptocurrency and its meaning have been the talk of the global town for about the last twelve years being featured in newspapers, on radio shows, on TV news and talk shows and even on billboards. Much has been said about the controversial investment opportunity and...

Shares
Share This