Do a quick Google search for “password hacking software”, and you will be shocked (and maybe appalled) at how many people sell programs design to crack your passwords and hack your accounts. You’ll also find questions from people around the world asking, “what are the best ways to hack someone’s password?” These are the people you need to protect yourself against.
Here are the top cybersecurity factors to make a strong password and accessing your accounts:
Depending on the hacking method used, a six-letter password, with no numbers or capital letters (“orange”, for example), may take up to 10 minutes to hack, or as little as 1 second if a fast attack hacking program is being used. By adding extra letters to our password (for example, “orangemarmelade”), it will now take months to hack, and adding numbers and special characters (“Orang3marme!ade”) will take centuries to crack, even using the most powerful hacking software. Put another way, changing “orange” to “oranges” will increase the number of items a hacking program must search through 26 times, for 26 letters in the alphabet. But substituting zero for the “o”, “0range” increases it 260 times (26 letters x 10 numbers), and “orange!” Increase it up to 8,580 times! (26 letters x 10 numbers x up to 33 special characters).
Don’t use your name, first, last or middle, as your password. The three passwords that a hacker will try first is, “password”, “123456” and different combinations of your name. The same goes for the names of family members, pets, friends, etc. A lot of this information is easy for hackers to find and they won’t hesitate to use it against you.
If it’s in the dictionary, it’s a real word, and it doesn’t belong in your passwords. There is an entire method of password hacking called “dictionary attack” that exploits people’s tendency to use dictionary words in their passwords.
Turn off automatic passwords, auto-login, and password storage on your web browsers (IE, Firefox, Chrome, etc.) Any password stored in this way can be hacked.
Don’t log in to important accounts on shared computers (your home-family computer is fine, as long as you trust everyone at home). This includes library computers, shared office computers, etc. The same goes for public internet connections, like a public wifi hotspot at a coffee shop, web proxies, free VPN, or Tor.
If your account has the option, turn on the 2-step verification. This adds an extra layer of security by not only requiring you to enter your password correctly but also entering a code that the system will send to your email, SMS text messages, mobile or landline phone. This way, even if a hacker gets access to your password, your account will still be protected because he doesn’t have access to your phone or email account