Sunday, January 24, 09:08
Home security Password: 2020 security best practices

Password: 2020 security best practices

Worried about protecting your financial transactions and private data stored online? A strong password is your first line of defense against security threats, fraudsters and hackers. Implementing best password security practices is just as important in the workplace as at home.

Password

You have to understand the seriousness of it contains a password that one can easily guess. Also, no, you can't have the same password for twenty different ones accounts, just because it's easy to remember. Let's go straight to some of the best policies that will help you create a reliable, secure password.

  1. Character length: There is no ideal character length for passwords. The more characters, the harder it is to spot. However, use at least 8 characters to cover the minimum minimum security practice.
  2. Character Type: Use an ASCII character combination - uppercase, lowercase, numbers, and symbols. It will limit the overall chances of your password being hacked. Example: XkeDZaJ3% yIOd3
  3. Password Dictionaries: The password should not be included in the popular passwords dictionaries. There are tools where you can check your known password lists. Try them.
  4. Password Manager: Passwords are too big and complicated for them remember; Use a password manager. This is enough.
  5. Password Generators: Random passwords generators are available that offer better password security.

What NOT to do

  1. Do not use words from the dictionary. If your passwords make sense, they probably have already been hacked.
  2. Password Change Requirements: Contrary to popular belief, NIST's latest research discourages frequent password changes and calls it counterproductive for good practices security.
  3. Pet Names: No doubt, you love your cat and it is adorable to put her name on the password. But, don't do it! The hackers can easily guess it. The same goes for them people, places and events.
  4. Reuse Password: If you have to change your password, do not change it from "Utopian.Knight1" to "Utopian.Knight2". Create a new one.
  5. Qwerty7894 is not secure. Don't use keyword patterns in any form.

See below for some examples of bad password

  • 123456
  • Password
  • QWERTY
  • 1qaz2wsx
  • passw0rd
  • awesomedog1
  • coolguy18

Here are some examples of good passwords

  • NK-LzHjm * 9 $ M79h
  • hd2 $ 9T% J
  • g) AN.}% H
  • A) ”N + zwf \ 'ykb = fx3 ^
  • TmDEL3NmkRRbdvnn3
  • .v {tW! LErh: N? 6y

The stolen and weak passwords are the most common reasons for data breaches. Experts do not emphasize enough the importance of using a strong password. The sure way for your security is - just understand what exactly a non-valid password can cause and follow all the above tips.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...
00:01:55

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...
00:02:12

Elon Musk: Gives $ 100 million for best CO2 capture technology

https://www.youtube.com/watch?v=Y0iUZc30vj4 Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...

SEPA: He refused to pay a ransom and thousands of files were leaked

Thousands of stolen files of the Scottish Environmental Protection Agency (SEPA) have been published by hackers, after the organization refused to pay the ransom ...

Fines at Valve, Capcom and Zenimax for geo-exclusion of games

Following a European Commission investigation, a group of video game publishers was fined € 7,8 million following allegations of geo-exclusion practices. In...