Each day, our lives become more inseparable from the internet; we email instead of call, we stay in touch with social media, we shop online, bank online, etc. And each of our online accounts requires a password. We all know that choosing a strong password is important for internet security, but nonetheless many of us opt for weak passwords simply because they are easier to remember and keep track of. While it is inconvenient to create very strong passwords, the potential fallout from having your accounts hacked will be much more inconvenient. Don’t worry; after reading this article, you’ll be a pro when it comes to knowing whether a password is strong, and we’ll give you a handy secure password generator to take some of the guesswork out of creating a strong password.
Here are the top cybersecurity factors to make a strong password and accessing your accounts:
This takes extra work on your part, for sure. But imagine what would happen if a hacker cracked just one of your passwords—a password that you use to access several different accounts. The hacker would now be free to sign in to any of the accounts using that password. Don’t make a hacker’s job any easier!
Don’t use your name, first, last or middle, as your password. The three passwords that a hacker will try first is, “password”, “123456” and different combinations of your name. The same goes for the names of family members, pets, friends, etc. A lot of this information is easy for hackers to find and they won’t hesitate to use it against you.
Turn off automatic passwords, auto-login, and password storage on your web browsers (IE, Firefox, Chrome, etc.) Any password stored in this way can be hacked.
Don’t log in to important accounts on shared computers (your home-family computer is fine, as long as you trust everyone at home). This includes library computers, shared office computers, etc. The same goes for public internet connections, like a public wifi hotspot at a coffee shop, web proxies, free VPN, or Tor.
You can make sure your connections are encrypted when using your mobile devices by setting up a VPN (Virtual Private Network) on your home computer. Then, whenever you use your cell phone, tablet or laptop, connect to the VPN, and this will encrypt all the data that is leaving your mobile device so that hackers and hacking software can’t read it.
If your account has the option, turn on the 2-step verification. This adds an extra layer of security by not only requiring you to enter your password correctly but also entering a code that the system will send to your email, SMS text messages, mobile or landline phone. This way, even if a hacker gets access to your password, your account will still be protected because he doesn’t have access to your phone or email account