{"id":124540,"date":"2022-05-04T12:57:00","date_gmt":"2022-05-04T16:57:00","guid":{"rendered":"https:\/\/rbach.net\/?p=124540"},"modified":"2022-05-04T12:57:00","modified_gmt":"2022-05-04T16:57:00","slug":"world-password-day-tips-and-tricks","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/world-password-day-tips-and-tricks\/","title":{"rendered":"World Password Day Tips and Tricks"},"content":{"rendered":"\r\n<p><span data-ogsc=\"black\"><a href=\"https:\/\/broadweb.com.au\/world-password-day\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-124554\" title=\"World Password Day Tips and Tricks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_Password_Day.png?resize=125%2C70&#038;ssl=1\" alt=\"World Password Day Tips and Tricks\" width=\"125\" height=\"70\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_Password_Day.png?resize=150%2C84&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_Password_Day.png?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_Password_Day.png?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_Password_Day.png?w=1000&amp;ssl=1 1000w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a><strong>World Password Day<\/strong> is May 5th. It\u2019s the perfect time to educate yourself on <strong>best practices<\/strong> to build <strong>better online behaviors<\/strong> around password use.<\/span><span data-ogsc=\"rgb(52, 55, 65)\"> World Password Day is meant to remind everyone about the importance of protecting themselves through strong passwords.<br \/><\/span><\/p>\r\n<h3>Under lock and key<\/h3>\r\n<p><a href=\"https:\/\/www.proofpoint.com\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-116691\" title=\"ProofPoint logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_proofpoint-e1631141155226-150x35.jpg?resize=102%2C24&#038;ssl=1\" alt=\"ProofPoint logo\" width=\"102\" height=\"24\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_proofpoint-e1631141155226.jpg?resize=150%2C35&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_proofpoint-e1631141155226.jpg?resize=75%2C18&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_proofpoint-e1631141155226.jpg?w=377&amp;ssl=1 377w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/a>Creating<strong> strong passwords offers greater security for minimal effort<\/strong>. <a href=\"https:\/\/www.proofpoint.com\/us\" target=\"_blank\" rel=\"nofollow noopener\">Proofpoint<\/a> uses the example of a padlock. You can buy a small padlock for less than a dollar\u2014but you shouldn\u2019t count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to \u201clock-up\u201d their most valuable assets, including money and confidential information.<br \/><br \/>Fortunately, everyone can learn how to make and manage stronger passwords. It\u2019s an easy way to strengthen security both at work and at home.<\/p>\r\n<h3>What Makes a Password \u2018Strong\u2019?<\/h3>\r\n<p><a href=\"https:\/\/blog.eldernode.com\/how-to-create-strong-password\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-124556\" title=\"What Makes a Password \u2018Strong\u2019?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_strong.jpg?resize=110%2C95&#038;ssl=1\" alt=\"What Makes a Password \u2018Strong\u2019?\" width=\"110\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_strong.jpg?resize=150%2C130&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_strong.jpg?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_strong.jpg?w=467&amp;ssl=1 467w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Let\u2019s say you need to create a new password that\u2019s <strong>at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters<\/strong>. You think of a word you can remember, capitalize the first letter, add a digit, and end with an exclamation point. The result: Applejacks1!<br \/><br \/>Unfortunately, hackers have sophisticated password-breaking tools that can <strong>easily defeat passwords based on dictionary words<\/strong> (like \u201capplejacks\u201d) and common patterns, such as capitalizing the first letter.<\/p>\r\n<p>Increasing a password\u2019s complexity, randomness, and length can make it <strong>more resistant to hackers\u2019 tools<\/strong>. For example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries.<\/p>\r\n<h3>Uniqueness Matters<\/h3>\r\n<p>Many people reuse passwords across multiple accounts, and attackers take advantage of this <strong>risky behavior<\/strong>. If an attacker obtains one password\u2014even a strong one\u2014they can often use it to access other valuable accounts.<img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-115905\" style=\"font-size: 16px;\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password-3.jpg?resize=300%2C150&#038;ssl=1\" alt=\"\" width=\"300\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password-3.jpg?resize=150%2C75&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password-3.jpg?resize=75%2C38&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password-3.jpg?w=700&amp;ssl=1 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>Here\u2019s a real-life example: Ten years ago, Becky joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.<br \/><br \/>Becky didn\u2019t realize the gardening forum had been hacked, and that users\u2019 login credentials had been leaked online. An attacker probably tried reusing Becky\u2019s leaked password on popular sites\u2014and eventually got lucky.<\/p>\r\n<h3>Guarding Your Passwords<\/h3>\r\n<ol>\r\n<li><strong>Don\u2019t write them down<\/strong> \u2013 Many make the mistake of writing passwords on post-it notes and leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, don\u2019t store your login information in a file on your computer, even if you encrypt that file.<\/li>\r\n<li><strong>Don\u2019t share passwords<\/strong> \u2013 You can\u2019t be sure someone else will keep your credentials safe. At work, you could be held responsible for anything that happens when someone is logged in as you.<a href=\"https:\/\/www.firststopit.co.uk\/do-i-need-a-complex-password-does-it-really-matter\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-124557\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwds_r_like_undies.png?resize=300%2C150&#038;ssl=1\" alt=\"\" width=\"300\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwds_r_like_undies.png?resize=150%2C75&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwds_r_like_undies.png?resize=75%2C38&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwds_r_like_undies.png?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/li>\r\n<li><strong>Don\u2019t save login details in your browser<\/strong> \u2013 Some browsers store this information in unsafe ways, and another person could access your accounts if they get your device.<\/li>\r\n<\/ol>\r\n<h3>Password tips for family and friends<\/h3>\r\n<p>Consider sharing what you\u2019ve learned about passwords and ask family and friends about their cybersecurity knowledge or experiences.<\/p>\r\n<ol>\r\n<li><strong>Never reuse passwords<\/strong> \u2013 Create a unique, strong password for each account or device. This way, a single hacked account doesn\u2019t endanger other accounts.<\/li>\r\n<\/ol>\r\n<p><strong style=\"font-size: 16px;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-124559\" title=\"Create complex, long passwords\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-6.jpg?resize=300%2C198&#038;ssl=1\" alt=\"Create complex, long passwords\" width=\"300\" height=\"198\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-6.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-6.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-6.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\r\n<p><strong style=\"font-size: 16px;\">\u00a0<\/strong><\/p>\r\n<p style=\"padding-left: 80px;\"><strong>2. Create complex, long passwords<\/strong> \u2013 Passwords based on dictionary words, pets\u2019 names, or other personal information can be guessed by attackers.<\/p>\r\n<p style=\"padding-left: 80px;\"><strong>3. Use a password manager<\/strong> \u2013 These tools can securely store and manage your passwords and generate strong new passwords. Some can also alert you if a password may have been compromised.<br \/><br \/><\/p>\r\n<p style=\"text-align: center;\"><em><strong><a href=\"https:\/\/www.obama.org\/updates\/help-ukraine\/\" target=\"_blank\" rel=\"nofollow noopener\">How you can help Ukraine!<\/a><\/strong><\/em><\/p>\r\n<p><strong>Related article<\/strong><\/p>\r\n<ul>\r\n<li><a title=\"Will we EVER learn? '123456' and 'password' are among the most popular passwords used by CEOs\" href=\"https:\/\/www.dailymail.co.uk\/sciencetech\/article-10778135\/Will-learn-123456-password-popular-passwords-used-CEOs.html\" target=\"_blank\" rel=\"nofollow noopener\">Will we EVER learn? &#8216;123456&#8217; and &#8216;password&#8217; are among the most popular passwords used by CEOs <\/a>\u00a0(<a title=\"Daily Mail\" href=\"https:\/\/www.dailymail.co.uk\/\" target=\"_blank\" rel=\"nofollow noopener\">Daily Mail<\/a>)<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers, and anything else that catches his attention since 2005. You can follow him on\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>World Password Day is May 5th. It\u2019s the perfect time to educate yourself on best practices to build better online behaviors around password use.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3627,209,2657,3638],"class_list":["post-124540","post","type-post","status-publish","format-standard","hentry","category-security","tag-3627","tag-password","tag-proofpoint","tag-world-password-day"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/124540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=124540"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/124540\/revisions"}],"predecessor-version":[{"id":126859,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/124540\/revisions\/126859"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=124540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=124540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=124540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}