Do a quick Google search for “password hacking software”, and you will be shocked (and maybe appalled) at how many people sell programs design to crack your passwords and hack your accounts. You’ll also find questions from people around the world asking, “what are the best ways to hack someone’s password?” These are the people you need to protect yourself against.
Here are the top cybersecurity factors to make a strong password and accessing your accounts:
As with names, you shouldn’t use any numbers in your passwords that are easily discovered by hackers, including your date of birth, social security number, phone number, zip code, or anything similar. If you have trouble staying away from names and important numbers, PasswordsGenerator.com has a secure password generator that will take the guesswork out of it for you.
If it’s in the dictionary, it’s a real word, and it doesn’t belong in your passwords. There is an entire method of password hacking called “dictionary attack” that exploits people’s tendency to use dictionary words in their passwords.
Don’t store any important passwords in the cloud, for the same reason as #7. Online storage is easily hacked into.
Don’t log in to important accounts on shared computers (your home-family computer is fine, as long as you trust everyone at home). This includes library computers, shared office computers, etc. The same goes for public internet connections, like a public wifi hotspot at a coffee shop, web proxies, free VPN, or Tor.
The standard recommendation is to change your passwords every 8-12 weeks. If you’re using a good random password generator to create strong passwords all the time and storing them safely (see #13), then changing passwords regularly is a good security measure. If, however, changing passwords often will just make you go back to weaker, easy to remember passwords, like your pet’s name, don’t bother. It’s better to have a really strong password and keep it forever than to have a new weak password every 3 months.
If your account has the option, turn on the 2-step verification. This adds an extra layer of security by not only requiring you to enter your password correctly but also entering a code that the system will send to your email, SMS text messages, mobile or landline phone. This way, even if a hacker gets access to your password, your account will still be protected because he doesn’t have access to your phone or email account