Hinder the Hacker: 5 Password Protection Tips

Everyone creates a password with one thing in mind: keeping data secure. But creating a password and keeping up with it is never easy. Many people average ten or more passwords for various home or office accounts, social media sites, and e-mail. Passwords are the first defense against intrusion and are created for safekeeping of personal information.

Use these tips to improve password management and make passwords stronger and easier to remember.

1. Refuse to reuse

There is an increase in personal information available on the internet. Therefore it is crucial to increase the number of passwords used for different accounts. Reusing passwords maximizes the risk of using a compromised password.

2. Strength in length

Short passwords make it easier for a hacker to crack. The more characters there are in a password the more difficult it is for a hacker to get in and retrieve information. You want to have eight or more characters in any password.

3. Variety

Spice up your password; do not stick to standard letters. Create a passphrase and replace letters with numbers or symbols. You want to complicate your password and make it impossible to access. The key is password balance; easy for you to remember but tricky for others to guess.

4. Getting too personal

Avoid personal information that is near and dear to you such as a pet’s name, birthdays, anniversaries, and family names. Your personal information should be just that — personal. Personal information makes it too easy for a hacker to intrude.

5. Shhh, it’s a secret

Your password is just that: your password! You want to keep it secure and protected, and be sure not to share it with anyone. It is nearly impossible to memorize all of your passwords. Avoid the old stand-by of writing it down on a sticky note. There are plenty of password management tools online for you to use to keep track of your passwords.

Related Posts
Social Network Threats and Solutions
Can Thinking Like a Hacker Help You Be More Secure?
Security Competencies: What They Are and Why We Need Them

Related Courses
Cybersecurity Foundations
Wireless LAN Security and Analysis
CISM Prep Course

In this article

Join the Conversation