Make your password simple so that it’s harder to hack. Wait …what?

Make your password simple so that it’s harder to hack. Wait …what?

If there is one thing that people around the world have been trained to do it is to create highly secure passwords. In fact, the need for 6+ digit passwords that include uppercase, lowercase, special characters, numbers, and so on, is commonplace on every platform today.

But just because we as a collective have been conditioned to create passwords in a specific manner, does that mean it’s right? To put it bluntly, no it’s not.

Though this may be a shock to some, simple yet longer passwords are much harder to crack than short complex ones. Here’s an example. Most websites will require you to create the usual 6 to 8 digit password with the usual capitals, numbers, symbols, etc. With that, your password may come out to be something like this: PassW0rd01! 

Is that actually secure? Not really. Due to habit, encouragement, and general consensus over the years of what these passwords should be and what so-called special characters should represent, hackers and the algorithms they use have been trained to know how to swap out “0” for “O,” “A” for “@” and so on. And, as such, the password above is plain text to the seasoned hacker. 

My advice, take a different approach to making your password far longer, yet a lot simpler. May be your favorite TV show title—in my case, it would be The Big Bang Theory. Making this your password could appear as ilovethebigbngtheory. Notice I removed the “a” in the word “bang.” By doing so, I’ve not only made my password longer than required, but I’ve also added a level of complexity that is far harder to crack.

And even though I don’t use any symbols or numbers, ilovethebigbngtheory is mathematically much harder to crack due to the nature of the sentence structure, missing letter, and so on. But we can do even more. In instances where special characters can be represented by actual spaces, a simple yet highly secure password could be, “I Love the Big Bng Theory Very Much.” Again, no special characters other than spaces, but the length and mathematical complexity make it even more secure. 

And if you’re uncertain about how secure your password is, go to this site for a quick check: https://howsecureismypassword.net.

In addition to the lengthy yet simplified password practice, I also suggest using secure platforms such as   LastPass, Dashlane, Keeper, and so on. Also known as password managers, or password vaults, these types of platforms manage all your passwords in one place, usually with a primary password to access your account. The benefit is that you can finally stray away from using one password for all your cloud and other activities. By randomizing all passwords, and adding lengthy and even sometimes weird structures, along with enabling a password vault to secure them, adds yet another layer of security to the mix. 

And lastly, educate, educate, and re-educate your team members on password security and best practices. By creating new habits while simultaneously increasing the knowledge and perseverance needed for today’s digital age, your cyber resiliency will increase fourfold, keeping the bad guys at bay.

Great article Bill !! A lot to think of when creating one of our many passwords.

赞
回复
Christopher J. Wilson

Insurance Advisor representing Co-operators/Mutual Fund Investment Specialist, Co-operators Financial Investment Services Inc.

5 å¹´

Good info, Bill. I’ve switched to using short phrases as most passwords.

Ewa Kemble

Walking the thin line between Art and Science, Creation and Management, Dreams and Reality

5 å¹´

Unfortunately many platforms restrict their passwords to maximum digits and also do not accept many symbols (space is no go) what to do then??

赞
回复
Dan Deganutti

SVP Sales & GM Canada at BeyondTrust / GTM Sales Leader / Coach / Mentor

5 å¹´

Great post Bill. Let's not forget #PAM solutions for the corporate world!! https://www.beyondtrust.com/

赞
回复

要查看或添加评论,请登录

Bill Dunnion的更多文章

  • This is all about your employee’s stolen identity

    This is all about your employee’s stolen identity

    Everything in the modern age is digital—and of course you all know that. However, most people rarely contemplate what…

    2 条评论
  • Hey Alexa, give cybercriminals full access to my personal information

    Hey Alexa, give cybercriminals full access to my personal information

    Those who know me will tell you that I have a love/hate relationship with IoT of any kind. The love part is easy:…

    4 条评论
  • Why everyone’s accounts are so easy to hack

    Why everyone’s accounts are so easy to hack

    When it comes to cybersecurity, the number of breaches happening daily are almost impossible to count. In fact, just…

    4 条评论
  • Are your IoT devices about to attack you?

    Are your IoT devices about to attack you?

    I know it’s a weird question to ask, after all how dangerous can a wi-fi enabled thermometer be? Don’t own a…

    3 条评论
  • How the smallest of devices pose the largest security threats

    How the smallest of devices pose the largest security threats

    I’ve often said that we live in an absolutely amazing time in history. The sheer amount of technological advancements…

    1 条评论
  • The reality of fighting a never-ending war with no borders

    The reality of fighting a never-ending war with no borders

    Remember the days when cyber security was nothing more than a firewall and some anti-virus software? Okay, perhaps just…

    2 条评论
  • Just how much does your company truly know about cyber security?

    Just how much does your company truly know about cyber security?

    If I’ve said it before, I’ll say it again: everybody needs to be a cyber security expert in 2020 and beyond. And though…

    2 条评论
  • Cyber Security in the age of "No Perimeter"

    Cyber Security in the age of "No Perimeter"

    As digital transformation continues to reshape the business landscape, cyber security becomes an even greater…

    4 条评论
  • When the "New Normal" includes human involvement in cyber security

    When the "New Normal" includes human involvement in cyber security

    It’s hard to believe that the majority of the world’s knowledge-based economy workers have been working from home for…

  • Beware the horrors that dwell in the Microsoft 365 migration

    Beware the horrors that dwell in the Microsoft 365 migration

    For decades, Microsoft has been and continues to be an integral part of modern business infrastructure. Therefore, it’s…

    3 条评论

社区洞察

其他会员也浏览了