Do a quick Google search for “password hacking software”, and you will be shocked (and maybe appalled) at how many people sell programs design to crack your passwords and hack your accounts. You’ll also find questions from people around the world asking, “what are the best ways to hack someone’s password?” These are the people you need to protect yourself against.
Here are the top cybersecurity factors to make a strong password and accessing your accounts:
Turn off automatic passwords, auto-login, and password storage on your web browsers (IE, Firefox, Chrome, etc.) Any password stored in this way can be hacked.
Don’t store any important passwords in the cloud, for the same reason as #7. Online storage is easily hacked into.
Don’t log in to important accounts on shared computers (your home-family computer is fine, as long as you trust everyone at home). This includes library computers, shared office computers, etc. The same goes for public internet connections, like a public wifi hotspot at a coffee shop, web proxies, free VPN, or Tor.
There are several password strength meters available online to check the strength of your passwords (make sure the site has https before the web address, not HTTP. Remember, “s” is for “secure”). One slightly different take that I like tells you the time it would take for different speed hacking programs to crack your password. It’s useful information to have, but take it with a grain of salt and make sure to read the note if you use this tool. These are great if you want to confirm the strength of passwords you got from our secure password generator.
We’ve already said that you shouldn’t store important passwords in your internet browsers or in the cloud, and we at PasswordsGenerator.com don’t recommend you keep them on a sticky note under your keyboard either. The best way to store your passwords is to memorize a few master passwords and manage them with a password management software, or store your other passwords in a plain text file and encrypt the file with 7-Zip, GPG, or a disk-encryption software.
If your account has the option, turn on the 2-step verification. This adds an extra layer of security by not only requiring you to enter your password correctly but also entering a code that the system will send to your email, SMS text messages, mobile or landline phone. This way, even if a hacker gets access to your password, your account will still be protected because he doesn’t have access to your phone or email account