Techsplained: How to Create a Secure Password
If you enjoyed this video we have many more on our YouTube Channel to help you improve your tech knowledge, give you advice and even โHow Toโ videos.
Power up your passwords to keep your business data safe.
In this Techsplained video, AJ explains how to power up your password security game to keep your business data safe.
If youโre like me then youโฏprobablyโฏhave quite a few different online accounts for different stores, services, social media and more. Many of these include hack-worthy information like your date of birth or social security data, or even bank and credit card details, soโฏitโs important that youโฏkeep these accounts secure.
However, at the point at which weโre creating our passwords, our mind is often more on getting the account set up quickly than ensuring weโre creating a secure password. Thatโs where the problems start, and thatโs why in this Techsplained weโre talking about password security.
So you should be asking yourself; โAre my passwords secure?โ, โAre they complex enough?โ, โAm I using some of the weakest passwords?โ & โHow can I tell if my passwords are known to hackers?โฏโ.
Thankfully, those questions arenโt as difficult to answer as it may seem. So, letโs have a look at this in more detail and give you some password security tips.
What are some of the least secure passwords?
Believe it or not there are many,โฏ manyโฏpeople who use such simple and unsecure passwords that you donโt need an AI-powered supercomputer to guess them.
Even today, some of the most popular passwords include:
- Password (or Pa55word)โฏ
- Wordpassโฏ(or Wordpa55)โฏ
- Password1 (or Password12345)โฏ
- Quertyโฏ(orโฏqwertyuiop, orโฏytrewq)โฏ
Or any variation of these with concurrent or repeating numbers.โฏ
And these are just a fewโฏof the most common,โฏleast secure passwords.โฏ
NordPass, creators of the Nordpass password manager (more about that later), publish a list of the 200 most common passwords every year, along with an estimate of how long it would take a regular hacker to crack them. You might not be surprised that perennial bad password favourite โ123456โ was top for 2020, but you might be more surprised that โashleyโ, โsunshineโ and โjacket025โ all make the top 50. The vast majority of these simple, non-complex password would take less than a second to crack.
So now we know what makes a weak password, what classifies as a secure password?โฏ
What makes a Strong Password?
Letโs jump back to that scenario where youโre sat at your computer raring to buy that cool new thing, and all that stands in your way is the creation of a new password.
Letโs go through a few simple steps to get you quickly to a stronger password.
Firstly, do not useโฏyourโฏnameโฏor a family memberโs name (such as the โAshleyโ mentioned above). You may think this seems unrelated to you (in a data sense anyway), but with reams of data floating around the dark web, itโs not always as hard as you would hope to connect the dots.
Start by choosing a random word. Donโt worry, thatโs not your password, weโre going to make it more secure! Letโs, for the sake of this example, choose a simple word like:
house
The first layer of complexity to add to it is to mix up the cases. Useโฏupper andโฏlower caseโฏlettersโฏmixed throughout the word. So letโs look at that again now:
HoUse
Better, but still too simple. Letโs add some numbers. However, we shouldnโt just dump them on the end, like we saw in many of the Nordpass examples. Letโs spread them throughout the word, and avoid using repeating or consecutive numbers. How does that look now?
62HoUse7
Getting better. Next letโs add some special characters. These are the characters on your keyboard that arenโt letters or numbers, such as @ or $. Letโs sprinkle a few on:
62HoU$e7
What we could do here is to mix some numbersโฏ&โฏcharacters together.
62HoU$37
Finally, we should be using a password of at least 8 characters, more if possible. The best way to achieve this is to start with a longer word, or even a whole phrase, and then apply the steps weโve just gone through.
Oh, and one final thing, never reuse passwords across different accounts.
I know what youโre thinking. If my password is so complex now, why canโt I reuse it?
Well, letโs find out.
Why shouldnโt you reuse passwords?
Unfortunately, even the most complex passwords arenโt immune to theft.โฏ
Yourโฏpasswords could still be leaked to hackers if theโฏwebsite whichโฏyour account isโฏwithโฏis hacked itself and user details stolen.โฏEven web giants like eBay and Adobe have suffered breaches in which almost their entire account lists where leaked.
If this happens, evenโฏthe mostโฏsecure password could be compromised and leaked on to the dark web for cybercriminals toโฏfind and use.โฏ
If this is theโฏcase, the cybercriminals can use that password to access your other accountsโฏusing the same details.โฏ And ifโฏthatโฏpassword is reused with your email providerโฆโฏthen hackers instantlyโฏhave the ability toโฏfind which other account are linked to that email address. From there they can resetโฏallโฏofโฏyour passwords by using the password reset feature for many popular websites.
By using new unique passwordsโฏfor every account ensures that all yourโฏaccountsโฏare willโฏstay more secure.โฏ
But,โฏif, like me, you have more than 400 accounts, or at least 100 like the average person does, how on earth can you keep track of them all?โฏ
Using Password Managers to securely store your passwords.
Password Managers allow you to store your passwordsโฏsecurely and allow you to access your stored passwords from anywhere via a Mobile App, Computer App orโฏWeb Browserโฏ
Someโฏpassword managers,โฏsuch as 1Password, MyGlue and LastPassโs Business plan even allow you to store Two Factor Authentication codesโฏagainst password records. This helps you to keep your accountsโฏevenโฏmore secureโฏand gives you easy access to all the information you will need to log in securely to your accounts. Just remember to use a unique password forโฏyourโฏPassword Manager.โฏ
To learn more about Two Factor Authentication (2FA) take a look at our What if Two Factor Authentication video.
Passwords stored in password managers are usually secured behind 256-bit AES encryption, which is one of the most reliable and widely used encryption algorithm techniques. This ensures that, without a decryption key, your passwords would be almost impossible to view as plain text.
Most Password Managers also offer unique password generation functions to allow you to create new, random and highly-secure passwords every time you create a new online account.
Some,โฏsuch as 1Password, also require you to create a security key of more than 30 characters as well as your email and password, for an extra level of unguessable security. Some even offer the ability to unlock with an authentication code on top of this!
This might seem like replacing one problem with another, but itโs still a lot easier to remember a password, 30-character key and numerical PIN than it is to remember 100 unique passwords!
If youโd like to know more about PasswordโฏManagers leave us a comment and we might cover this in a future Techsplained.
What else can I do to stay safe online?
Creating complex and unique passwords really does help protect you against some of the most common online attack types, like password-guessing attacks where computers are uses to guess thousands of passwords a minute.
Unfortunately, even with the most secure passwords in the world, websites still get hacked, and when this happens stolen account information is often released on the dark web where it can be bought and used by other hackers in targeted attacks.
If you could find out when your account details appear on the dark web, then youโd be able to change your password and make your account secure once again.
And, thankfully, you can!
Here at One2Callโฏwe offer anโฏactive Dark Web Monitoringโฏservice which scans to see if your account information has been leaked on the dark web. As soon as we spot details related to your email address or web domain, weโll let you know, and weโll also offer advise on how to stop your accounts from being leaked in future.
You can learn more about our Dark Web Monitoring service here.
Alternatively, use the contact form below to arrange time with our consultants during which they can give you advice about theโฏservicesโฏwe offer to protect your business.โฏMention this article for a freeโฏone-offโฏ Dark Web Reportโฏfor your businessโฏdomain
Move to One2Call manage for your IT Support and your Microsoft Office 365 andโฏwe can also implementโฏpassword policies for your business to enforce strong passwords andโฏfor themโฏto be reset on a regular basis.โฏโฏ
When combined with active dark web monitoring we can temporarily disable accounts that show up on the dark web to protect you and your business from potential attacks.โฏ
For more info on email security take a look at our email security pages.
Weโll also be producing more content on this and other tech topics in future, so be sure to subscribe to our socials and subscribe to Techsplained and TechBytes to be the first to know about future content.
We hope you have found this information useful. Leave us a comment over on our YouTube Channel to let us know what you think or to ask a question.
FREE Business Dark Web Scan
Testimonials
Tracy Lilley, Ecclesfield Primary School
Responsive, friendly service. Very customer focused, polite and eager to help. Would definitely recommend and will use again.
Mick, MS International
Easy to get hold of and down to earth.
Rob Watt, Straaltechniek
Quick and easy. Pawel always great to deal with.