Password Security and Safety

There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. If your password becomes compromised, there are limitless consequences to what could happen. There are a few very important factors in keeping your passwords safe and secure that everyone should adhere to.

Do not tell anyone your password
No one should every know your password, your bosses, your friends, or your bank. None of them should ever know your personal passwords. Any help desk, company, or organization will have administrators or technicians that can reset your password if they need to do something with your account. Organizations will never ask for your password over the telephone or e-mail!

Do not write your passwords down
The key to a good password is one that you can remember easily, but is hard to guess. It's very important not to write your password down. Hiding it inside your desk, a book, in a picture is just waiting for someone snoopy to find it. Some organizations will require the writing down of passwords, but generally these are Administrator positions and the password books are locked up in a controlled safe or secure location. Your boss shouldn't have all your personal passwords in his desk!

Be aware all the time
When you are entering your password at the computer, or at a bank machine, be aware of who is around you. If you think someone is trying to look at what you are typing, ask them to step back, turn their head, or cover up the keyboard or keypad with your other hand. If you think that anyone may have your password or has seen you enter it, change your password immediately.

Do not use the same password
Far too many people only use one password for everything they do, it makes it easier to remember, but compromises their security. If you use the same password for chatting on a web forum and your online banking password, you are just asking for trouble. Use unique passwords for different projects, websites, and logins.

Password complexity
Password complexity is a very important issue with most users. Often users will have small passwords that are very simple because they worry about trying to remember them. It's very important to have a password that is complex enough to stop people from guessing it, or using automated programs to randomly break it. I will outline good and bad characteristics of passwords below, along with some tips for creating passwords.

Avoid bad passwords, or easily guessable passwords
There are many characteristics that are considered bad when it comes to choosing a password. These characteristics should be avoided at all costs to help keep your password as secure as possible.

Don't use personal information in your passwords. Passwords that contain your date of birth, pets, drivers license number, social insurance number and similar information should be avoided. This also means person numbers of your children, friends, and family also!

Make sure your password is adequately complex, don't use passwords like: kenken, dog, sex.

Stay away from incremental passwords! If you use a password like HiThere1, don't change your password every few months with HiThere2, HiThere3. Create unique passwords each time.

Don't reuse your old passwords even if you haven't used that password in 3 password changes, keep away from reverting to your old passwords.

Don't use words from the dictionary. Passwords should be original conceptions, with no words that could be guess be an automated program.

Notes on character substitution I mentioned in the last point that dictionary words should be avoided. This is very true, but in addition to that, there are now dictionary attacks that integrate common slang spellings and special characters. For those of you who were on the internet and BBS world, the old KRAD, elite speak, can be just as easily guess as a properly spelled word from the dictionary. A couple of examples of what I'm talking about are, "elite speak" could just as easily be "l33t sp34k", "project" and "pr0j3ct". Don't rely on character substitution as a means of securing a simple password.

Creating a good password
Creating a good password is the key to your personal security. Keep these rules in mind when choosing your passwords:

A password should be over eight (8) characters in length.
Do not use dictionary words.
Do not use character substitution such as "l33t sp34k"
Do not user personal information
Do not use variations on your userid or login name
Use both upper and lower case letters (a-z and A-Z)
Use numbers in your password
Use special characters (% # @ *)

Remembering passwords
Everyone knows how frustrating it is to remember passwords, but there is one way that seems to help many people. Trying creating your password using a Mnemonic Device.

"I like money, give me your money!" could translate to: Il$,gmyM! "Oh, I wish I was an Oscar Myer Weiner!" could be: OH,iwIwaOMW

Simple phrases that are easy to remember for you seem to work the best.

"I live in Toronto, Ontario, Canada EH?" - iLiTOCeh?

Ken Dennis
http://KenDennis-RSS.homeip.net/

In The News:


Kitsap Sun

OC launches investigation of security director
Kitsap Sun
BREMERTON — Olympic College has launched an investigation of complaints against its director of campus safety in light of a vote of no confidence by the union representing security guards. The vote, taken in mid-January, showed 88 percent of members ...


The Sun

Security services knew of glaring weakness in Parliament security after 'war game' simulating attack on Westminster ...
The Sun
SECURITY services were aware of gaps in Parliament's security after a simulated attack ended with most MPs being killed, it has been claimed. A source quoted by the Sunday Times claimed a “table-top” exercise revealed four terrorists with automatic ...
Security chief told MPs they were safe in parliament before attackThe Guardian
Urgent review of security gates of Parliament needed after Westminster attackExpress.co.uk

all 56 news articles »

The Independent

Security breach renders in-flight laptop ban useless
The Independent
The airport which is the main target of the Government's ban on electronic devices has a security flaw that renders rigorous checks futile, The Independent can reveal. After clearing six separate security hurdles at Istanbul airport, passengers bound ...

and more »

Rochester Democrat and Chronicle

JCC receives $200,000 to improve security - Democrat and Chronicle
Rochester Democrat and Chronicle
Funds will be used to upgrade cameras and other measures following two bomb threats at the Brighton facility this month.
JCC of Rochester gets $200,000 for security enhancements | WXXI ...WXXI News

all 4 news articles »

The Independent

WhatsApp: Scapegoat for London's security lapses
DEBKA file
British Home Secretary Amber Rudd Sunday, March 26, attacked WhatsApp for refusing intelligence services and police access to its encrypted messaging service, used by Khalid Masood three minutes before his terrorist rampage in London last Wednesday.
Ex-cyber security chief says Government is 'using' Westminster attack to grab unnecessary spying powersThe Independent
WhatsApp security debate must be informed or we will all sufferiNews
Home Secretary Amber Rudd: Give security services access to WhatsAppThe National

all 175 news articles »

Reuters

Britain reviewing security at parliament after deadly attack
Reuters
Interior minister Amber Rudd told the BBC there would be another review of security at the Palace of Westminster, but that such arrangements were continually assessed. "There are constant reviews and updates so that we have the right form of defense in ...
London attack fuels calls for tighter Westminster securityThe Guardian
London attack: Parliament security under reviewBBC News
Questions over Parliament security as motorcyclist rides through gate shortly after terrorist attackTelegraph.co.uk
Wall Street Journal (subscription)
all 8,413 news articles »

The Japan Times

European security ties 'too precious' for Brexit talks
The Japan Times
LONDON – Britain's intelligence expertise may be “too precious” to use as a bargaining tool in the upcoming Brexit talks, experts said, after a terror attack in London highlighted the need for continued European security cooperation. The suggestion ...

and more »

New System Estimates Cleveland Airport Security Wait Times
U.S. News & World Report
New System Estimates Cleveland Airport Security Wait Times. Cleveland's main airport is developing a system to help travelers more accurately compare wait times at its security checkpoints and better plan their trips. | March 27, 2017, at 12:08 a.m.. MORE.

and more »

Huffington Post

What Don't We Talk About When We Talk About Israel's Security
Huffington Post
When Israeli and American Jews talk about “Israel's security” they are thinking about the Holocaust and about extermination. That is the reason they choose the narrowest possible definition of “security,” a strip. Israel's “security” is what we ...

and more »

Otago Daily Times

Ivory Coast rescinds port security measures, attack threat unfounded
Reuters
"After compiling the information ... it emerged that the threat is not real," the head of maritime security Colonel Bertin Koffi Tano wrote in a second order to the Abidjan and San Pedro port authorities and shipping companies on Sunday. "I ask that ...
Ivory Coast boosts port security over attack threatOtago Daily Times

all 5 news articles »
Google News

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More