Each day, our lives become more inseparable from the internet; we email instead of call, we stay in touch with social media, we shop online, bank online, etc. And each of our online accounts requires a password. We all know that choosing a strong password is important for internet security, but nonetheless many of us opt for weak passwords simply because they are easier to remember and keep track of. While it is inconvenient to create very strong passwords, the potential fallout from having your accounts hacked will be much more inconvenient. Don’t worry; after reading this article, you’ll be a pro when it comes to knowing whether a password is strong, and we’ll give you a handy secure password generator to take some of the guesswork out of creating a strong password.
Here are the top cybersecurity factors to make a strong password and accessing your accounts:
As with names, you shouldn’t use any numbers in your passwords that are easily discovered by hackers, including your date of birth, social security number, phone number, zip code, or anything similar. If you have trouble staying away from names and important numbers, PasswordsGenerator.com has a secure password generator that will take the guesswork out of it for you.
If it’s in the dictionary, it’s a real word, and it doesn’t belong in your passwords. There is an entire method of password hacking called “dictionary attack” that exploits people’s tendency to use dictionary words in their passwords.
Make sure your password can be changed if need be. Fingerprints and retinal scans seem like ideal passwords, except they can be replicated with the right technology, and they can’t be changed. You can create unique, strong easily changeable passwords with our passwords generator.
Turn off automatic passwords, auto-login, and password storage on your web browsers (IE, Firefox, Chrome, etc.) Any password stored in this way can be hacked.
Don’t store any important passwords in the cloud, for the same reason as #7. Online storage is easily hacked into.
Don’t log in to important accounts on shared computers (your home-family computer is fine, as long as you trust everyone at home). This includes library computers, shared office computers, etc. The same goes for public internet connections, like a public wifi hotspot at a coffee shop, web proxies, free VPN, or Tor.