{"id":129267,"date":"2024-05-24T16:40:00","date_gmt":"2024-05-24T20:40:00","guid":{"rendered":"https:\/\/rbach.net\/?p=129267"},"modified":"2024-06-26T15:00:48","modified_gmt":"2024-06-26T19:00:48","slug":"creating-strong-passwords-is-good-for-you","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/creating-strong-passwords-is-good-for-you\/","title":{"rendered":"Creating Strong Passwords is Good For You"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer.jpeg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-131209\" title=\"Creating Strong Passwords is Good For You\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer.jpeg?resize=125%2C125&#038;ssl=1\" alt=\"Creating Strong Passwords is Good For You\" width=\"125\" height=\"125\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer.jpeg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer.jpeg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer.jpeg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer.jpeg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer.jpeg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a>You can buy a small padlock for less than a dollar\u2014but you shouldn\u2019t count on it to protect anything of value. A thief could pick a <strong>cheap lock<\/strong> without much effort, or break it. Yet, many people use <strong>weak passwords<\/strong>. They use them to \u201clock up\u201d their most valuable assets, such as money and secrets. Fortunately, everyone can learn how to make and manage stronger passwords. It\u2019s an easy way to strengthen security both at work and at home.<\/p>\n<h3>What makes passwords \u2018Strong\u2019?<\/h3>\n<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-1-e1716125346442.jpeg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-131210\" title=\"What makes passwords \u2018Strong\u2019?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-1-e1716125346442-150x133.jpeg?resize=100%2C89&#038;ssl=1\" alt=\"What makes passwords \u2018Strong\u2019?\" width=\"100\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-1-e1716125346442.jpeg?resize=150%2C133&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-1-e1716125346442.jpeg?resize=75%2C67&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-1-e1716125346442.jpeg?resize=768%2C682&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-1-e1716125346442.jpeg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-1-e1716125346442.jpeg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>We all hate the dreaded &#8220;you must change your password&#8221; email from IT. It must be at least 12 characters long. It must include numbers, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first letter, add a digit, and end with an exclamation point. The result: Strawberry1!<\/p>\n<p>Unfortunately, hackers have advanced tools. They can easily <strong>defeat passwords based on dictionary words<\/strong>. These are words like \u201cstrawberry\u201d and common patterns. An example is capitalizing the first letter.<\/p>\n<p>Increasing the complexity, randomness, and length of a password makes it stronger. These changes make it <strong>more resistant to hackers\u2019 tools<\/strong>. You can see in the table below from <a title=\"MyITRisk.com\" href=\"https:\/\/www.myitrisk.com\" target=\"_blank\" rel=\"nofollow noopener\">MyITRisk.com<\/a>. An attacker could guess an eight-character password in 8 seconds. But, a 12-character password would take four years to guess.<\/p>\n\n<table id=\"tablepress-94\" class=\"tablepress tablepress-id-94\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><strong>Password space characters<\/strong><\/th><th class=\"column-2\"><strong>Length required characters<\/strong><\/th><th class=\"column-3\"><strong>Defeted in.<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">26 (a-z)<\/td><td class=\"column-2\">8<\/td><td class=\"column-3\">.0077 Seconds<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">52 (a-z, A-Z)<\/td><td class=\"column-2\">8<\/td><td class=\"column-3\">2 Seconds<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">62 (a-z, A-Z, 0-9)<\/td><td class=\"column-2\">8<\/td><td class=\"column-3\">8 Seconds<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">26 (a-z)<\/td><td class=\"column-2\">12<\/td><td class=\"column-3\">59 Minutes<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">52 (a-z, A-Z)<\/td><td class=\"column-2\">12<\/td><td class=\"column-3\">168 Days<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">62 (a-z, A-Z, 0-9)<\/td><td class=\"column-2\">12<\/td><td class=\"column-3\">4 Years<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">26 (a-z)<\/td><td class=\"column-2\">16<\/td><td class=\"column-3\">51 Years<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">52 (a-z, A-Z)<\/td><td class=\"column-2\">16<\/td><td class=\"column-3\">91 Years<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">62 (a-z, A-Z, 0-9)<\/td><td class=\"column-2\">16<\/td><td class=\"column-3\">55,988.220 Years<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">MyITRisk.com<a href=\"https:\/\/myitrisk.com\/taxonomy\/term\/2\" title=\"MyITRisk.com\" rel=\"noopener nofollow\" target=\"_blank\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-94 from cache -->\n<p>&nbsp;<\/p>\n<p>It is also important to pay attention to <strong>password complexity<\/strong>. Also you should also pay attention to password unpredictability. You want to avoid common substitutions (e.g., &#8216;a&#8217; to &#8216;@&#8217;, &#8216;s&#8217; to &#8216;$&#8217;).<\/p>\n<h3>Why Uniqueness Matters<\/h3>\n<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-2.jpeg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-131211\" title=\"Why Uniqueness Matters\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-2.jpeg?resize=100%2C100&#038;ssl=1\" alt=\"Why Uniqueness Matters\" width=\"100\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-2.jpeg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-2.jpeg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-2.jpeg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-2.jpeg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Designer-2.jpeg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>People <strong>reuse passwords for many accounts<\/strong>. This risky behavior <strong>opens the door for attackers<\/strong>. Even a single password, even a strong one, can lead to access to valuable accounts. Password reuse can lead to a domino effect of account breaches.<\/p>\n<ul>\n<li><a title=\"Password reuse remains a major threat - report\" href=\"https:\/\/cybernews.com\/security\/password-reuse-major-threat\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>44% of passwords<\/strong><\/a> are reused on many accounts worldwide. This puts sensitive data at risk.<\/li>\n<li>Hackers compromise<strong> <a title=\"How Password Reuse Leads to Cybersecurity Vulnerabilities\" href=\"https:\/\/www.dashlane.com\/blog\/how-password-reuse-leads-to-vulnerabilities\" target=\"_blank\" rel=\"nofollow noopener\">20% of passwords<\/a><\/strong>, and users reuse 51% of passwords.<\/li>\n<li><a title=\"Password reuse remains a major threat - report\" href=\"https:\/\/cybernews.com\/security\/password-reuse-major-threat\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>54% of employees<\/strong><\/a> use the same password for several work accounts.<\/li>\n<\/ul>\n<p>Reusing passwords, even strong ones, can <strong>leave accounts exposed to attacks.<\/strong><\/p>\n<h3>Here\u2019s a real-life example<\/h3>\n<p>Ten years ago, Daisy joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum. But, someone accessed her payments account years later and stole a lot of money.<\/p>\n<p>Daisy didn\u2019t know someone had hacked the gardening forum. The hackers leaked users\u2019 logins online. An attacker likely tried reusing Daisy\u2019s leaked password on popular sites. Eventually, the attacker got lucky.<\/p>\n<h3>Guarding your passwords<\/h3>\n<ol>\n<li><strong><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/manyaccounts.jpg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-131213\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/manyaccounts.jpg?resize=100%2C100&#038;ssl=1\" alt=\"\" width=\"100\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/manyaccounts.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/manyaccounts.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/manyaccounts.jpg?w=619&amp;ssl=1 619w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Don\u2019t write them down<\/strong>. Many write passwords on post-it notes and leave them in plain sight. Even if you hide your password, someone could still find it. Similarly, don\u2019t store your login information in a file on your computer, even if you encrypt that file.<\/li>\n<li><strong>Don\u2019t share passwords<\/strong> \u2013 You can\u2019t be sure someone else will keep your credentials safe. While at work, you may have to take responsibility for anything that occurs when someone is logged in as you.<\/li>\n<li><strong>Don\u2019t save login details<\/strong> in your browser. Some browsers store this info in unsafe ways. Another person could access your accounts if they get your device.<\/li>\n<\/ol>\n<h3>Tips for keeping passwords secure<\/h3>\n<p>Consider sharing these password tips with family and friends.<\/p>\n<ol start=\"4\">\n<li><strong>Never reuse passwords<\/strong> \u2013 Create a unique, strong password for each account or device. This way, a single hacked account doesn\u2019t endanger other accounts.<\/li>\n<li><strong>Create long, complex passwords<\/strong>. Don&#8217;t use passwords based on dictionary words, pets\u2019 names, or personal information. Attackers can guess them.<\/li>\n<li><strong>Use a password manager<\/strong>. These tools can store and manage your passwords. They can also generate strong new passwords. Some can also notify you when a password might be compromised.<\/li>\n<\/ol>\n<h3><em>rb-<\/em><\/h3>\n<p><em>A strong password is the main barrier keeping most of your online accounts from being hacked. Without up to date practices, you might be using passwords that cyber-frauds can easily guess within minutes.<\/em><\/p>\n<p><em>The average user creates passwords to fight data theft. The user could switch up the characters in your passwords and \u201cTr1Ck\u201d your way into security. However. in today&#8217;s environment you need to create passwords that can fight modern password theft methods. Today, cyber-criminals use sophisticated technology to get your passwords. Users must consider the hackers software that is designed to account for user behavior as it guesses your passwords.<\/em><\/p>\n<p><em><strong>Related article<\/strong><\/em><\/p>\n<ul>\n<li><a title=\"Easily Guessed Passwords for New Accounts Include \u201cUser\u201d, \u201cTemp\u201d, \u201cWelcome\u201d\" href=\"https:\/\/securityboulevard.com\/2024\/05\/easily-guessed-passwords-for-new-accounts-include-user-temp-welcome\/\" target=\"_blank\" rel=\"nofollow noopener\">Easily Guessed Passwords for New Accounts Include \u201cUser\u201d, \u201cTemp\u201d, \u201cWelcome\u201d <\/a>\u00a0(<a title=\"Security Boulevard\" href=\"https:\/\/securityboulevard.com\" target=\"_blank\" rel=\"nofollow noopener\">Security Boulevard<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers, and anything else that catches his attention since 2005. You can follow him on\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are tips that anyone everyone can use to make better stronger passwords to strengthen security both at work and at home.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[3719,32,209,2193,894,2541],"class_list":["post-129267","post","type-post","status-publish","format-standard","hentry","tag-3719","tag-business","tag-password","tag-password-management","tag-password-strength","tag-passwords"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/129267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=129267"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/129267\/revisions"}],"predecessor-version":[{"id":131541,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/129267\/revisions\/131541"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=129267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=129267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=129267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}