Do a quick Google search for “password hacking software”, and you will be shocked (and maybe appalled) at how many people sell programs design to crack your passwords and hack your accounts. You’ll also find questions from people around the world asking, “what are the best ways to hack someone’s password?” These are the people you need to protect yourself against.
Here are the top cybersecurity factors to make a strong password and accessing your accounts:
Don’t use your name, first, last or middle, as your password. The three passwords that a hacker will try first is, “password”, “123456” and different combinations of your name. The same goes for the names of family members, pets, friends, etc. A lot of this information is easy for hackers to find and they won’t hesitate to use it against you.
As with names, you shouldn’t use any numbers in your passwords that are easily discovered by hackers, including your date of birth, social security number, phone number, zip code, or anything similar. If you have trouble staying away from names and important numbers, PasswordsGenerator.com has a secure password generator that will take the guesswork out of it for you.
Turn off automatic passwords, auto-login, and password storage on your web browsers (IE, Firefox, Chrome, etc.) Any password stored in this way can be hacked.
Don’t store any important passwords in the cloud, for the same reason as #7. Online storage is easily hacked into.
A strong password is no good if you transmit it willy-nilly. Only send sensitive information if you’re on a secure connection. A secure connection will say either “HTTPS” (as opposed to HTTP) or “SFTP” (as opposed to FTP). These connections are encrypted and much more difficult to hack than their counterparts.
You can make sure your connections are encrypted when using your mobile devices by setting up a VPN (Virtual Private Network) on your home computer. Then, whenever you use your cell phone, tablet or laptop, connect to the VPN, and this will encrypt all the data that is leaving your mobile device so that hackers and hacking software can’t read it.