5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake.

There are certain specific guidelines you need to follow to choose a safe and secure password. Use the following tips as a "how to" on making your password secure.

1. Your password must be alphanumeric. That simply means a mixture of numbers and letters such as xpf2778z. Why? When a hacker tries to break into a system they often use what are called dictionary or brute force hacks. A dictionary hack is an application that simply uses standard words and word combinations in an attempt to guess your password. For example many computer users use the word "password" as their actual password. A dictionary hack would crack that password in a few moments. Using alphanumeric passwords increases the number of possible password combinations by millions.

2. It should be 6 - 8 characters in length. The longer the password the harder it is for a hacking program to get around. If your password was abc then there are 6 possible password combinations. If your password was abc123 there are now over 720 password combinations possible. If your password was abc1234 there are now almost 6,000 possible combinations. Never, ever use a short password only comprised of letters.

3. Never use personal details in your password. People often use their home address, their age, husband or wives name, their social security number or their date of birth. These are incredibly easy to get access to by either a fellow employee or potential system hacker. Your password needs to be secure and hard to guess and personal details meet neither of these criteria.

4. Do not write your password down anywhere. Keeping a record of your password for somebody to find is as dangerous as keeping a copy of your ATM pin number in your wallet beside your ATM card. Create a memorable password that you'll have no problem recalling. This is not as hard as it sounds and if you jot some password ideas down you'll quickly come up with some good ones. Obviously burn the piece of paper you jotted your ideas down on.

5. Do not use the same password for more than 90 days. Create several variants of the same password and recycle them every 60 - 90 days. This adds an extra layer of security to your data. By recycling your password frequently you make your data 1000% more secure. You'll notice that most large corporates force their employees to change their password every month for this exact reason.

Hopefully these tips will help you choose a password that's both safe and secure and that you'll have some fun creating your new passwords too!

If you need a review of the spam blocker you intend buying then check out Spam-Site.com for spam blocker reviews.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Russia says NATO membership of Balkan countries threatens security
Reuters
SARAJEVO (Reuters) - NATO enlargement to take in members from the Balkan countries is undermining security and stability in the region, a senior Russian parliamentarian said on Monday. Valentina Matviyenko, speaking in the upper house of Bosnia's ...

and more »

NPR

Alexa, Tell Me A National Security Secret: Amazon's Reach Goes ...
NPR
It's little known that the CIA uses Amazon Web Services to store its data, and, now, it's the favorite for a big-money Pentagon contract to do the same. Amazon's tentacles go to other agencies, too.
Alexa, tell me a national security secret: Amazon's reach goes beyond the Post Office89.3 KPCC

all 1 news articles »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: April 14 - April 20
Council on Foreign Relations (blog)
April 15: Boko Haram killed three Chadian soldiers in Abadam, Borno. April 15: Herdsmen killed seventy-eight in Awe, Keana, Obi, and Doma LGAs in Nasarawa (casualties not specified by LGA; majority in Obi). April 16: Kidnappers killed one policeman and ...

and more »

Quick Take-Aways From the RSA Security Conference
CSO Online
The transition from “bolted on” to “baked in” security. With security as a top-of-mind issue across business and IT, security functionality is moving toward cloud, application, and IT infrastructure. Intel announced new chip-level security ...

and more »

Stars and Stripes

Chinese smartphones cited by intelligence as security risk sold on US bases
Stars and Stripes
“Regardless of where the device is purchased, on base or off base, servicemembers should practice good (operational security).” In February, the director of national intelligence, along with the heads of the CIA, FBI, National Security Agency, Defense ...

and more »

Chicago Tribune

Oakbrook Center security scans license plates in its parking lots, raising privacy concerns
Chicago Tribune
If you park at Oakbrook Center, your car may be part of a candid camera scenario, as security cars drive up and down aisles in lots and garages, using license plate reading technology to check the plate numbers on vehicles. The license plate ...

and more »

New York Post

National security adviser recently chaired nonprofit with anti-Muslim views
New York Post
National security adviser John Bolton recently chaired a nonprofit that has shared fake anti-Muslim news, according to a new report. Bolton was chairman of the New York-based Gatestone Institute, which peddled misleading and false anti-Muslim accounts ...
National Security Adviser John Bolton is the former chairman of a sensationalist, anti-immigrant nonprofitThe Week Magazine
John Bolton presided over anti-Muslim think tankNBCNews.com
Are Jihadists Taking over Europe?Gatestone Institute

all 17 news articles »

New security at courthouse diffuses several situations
Abilene Recorder Chronicle
The presence of security guards in the Dickinson County Courthouse is making workdays a little less stressful for some employees. Dickinson County Administrator Brad Homman told commissioners Thursday that not only has the screening process and metal ...


Haaretz

Egypt's New Internet Law Blocks Sites Over 'National Security Concern'
Haaretz
What is national security, wondered Yasser Abdel Aziz, a leading member of Egypt's National Council for Human Rights. “If I were to publish something saying that the president is not a native Egyptian, would that harm national security?” At a meeting ...


The Hill

Homeland Security chief issues warning to 'caravan'
The Hill
Homeland Security Secretary Kirstjen Nielsen · Kirstjen Michele NielsenSenators chart path forward on election security bill Navy, Marines chiefs say no morale issues with transgender troops Staff changes upend White House cyber team MORE said Monday ...
Trump Brands Migrant Caravan a 'Disgrace,' Orders Homeland Security Officials to Turn Away Immigrants at BorderNewsweek
DHS boss threatens 'caravan' border-crossers with prosecution, detention, deportationFox News

all 70 news articles »
Google News

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More