Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
5 Tips For An Unbreakable Password > NetSparsh - Viral Content you Love & Share

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake.

There are certain specific guidelines you need to follow to choose a safe and secure password. Use the following tips as a "how to" on making your password secure.

1. Your password must be alphanumeric. That simply means a mixture of numbers and letters such as xpf2778z. Why? When a hacker tries to break into a system they often use what are called dictionary or brute force hacks. A dictionary hack is an application that simply uses standard words and word combinations in an attempt to guess your password. For example many computer users use the word "password" as their actual password. A dictionary hack would crack that password in a few moments. Using alphanumeric passwords increases the number of possible password combinations by millions.

2. It should be 6 - 8 characters in length. The longer the password the harder it is for a hacking program to get around. If your password was abc then there are 6 possible password combinations. If your password was abc123 there are now over 720 password combinations possible. If your password was abc1234 there are now almost 6,000 possible combinations. Never, ever use a short password only comprised of letters.

3. Never use personal details in your password. People often use their home address, their age, husband or wives name, their social security number or their date of birth. These are incredibly easy to get access to by either a fellow employee or potential system hacker. Your password needs to be secure and hard to guess and personal details meet neither of these criteria.

4. Do not write your password down anywhere. Keeping a record of your password for somebody to find is as dangerous as keeping a copy of your ATM pin number in your wallet beside your ATM card. Create a memorable password that you'll have no problem recalling. This is not as hard as it sounds and if you jot some password ideas down you'll quickly come up with some good ones. Obviously burn the piece of paper you jotted your ideas down on.

5. Do not use the same password for more than 90 days. Create several variants of the same password and recycle them every 60 - 90 days. This adds an extra layer of security to your data. By recycling your password frequently you make your data 1000% more secure. You'll notice that most large corporates force their employees to change their password every month for this exact reason.

Hopefully these tips will help you choose a password that's both safe and secure and that you'll have some fun creating your new passwords too!

If you need a review of the spam blocker you intend buying then check out Spam-Site.com for spam blocker reviews.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Retirement Security: Fire And Fury In Telecommunications
Seeking Alpha
AT&T's merger with Time Warner has hit a brick wall and the market is celebrating. Here's what I'm doing. How about you? Subscribers to "Retirement: One Dividend At A Time" got an early look at this material via free instant text message trade alert ...

and more »

Forbes

How This Millennial Went From A High School Dropout To Cyber Security Expert
Forbes
Manan Shah, the 24-year-old founder of cyber security firm Avalance Global Solutions, is one of the top cyber security experts, but his path to the top was far from traditional. A high school dropout and former hacker, Shah had to overcome run-ins with ...


TechCrunch

Tortuga Logic raises $2 million to build chip-level security systems
TechCrunch
Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...


Fox News

Schools adept at shoring up security at any hint of danger
Fox News
Schools have become adept at rapidly shoring up security, measuring responses against the toll it could take on students' learning and sense of safety. The president of the National Association of School Resource Officers says schools regularly ...

and more »

New York Times

Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
New York Times
WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
Homeland Security official Jamie Johnson resigns after comments ...Washington Post
Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
Fort Dodge Messenger -New York Daily News -The Hill -FEMA.gov
all 71 news articles »

North Darfur security: Swiss aid worker released, kidnappers held
ReliefWeb
The security authorities in North Darfur announced on Wednesday that kidnapped Swiss aid worker Margaret Schenkel has been “released from her captors in a mountainous area during a professional security operation”. The head of the National ...

and more »

UN News Centre

Russia again vetoes extension of chemical experts in Syria
ABC News
And it was Russia's 11th veto of a Security Council resolution dealing with Syria, its close ally. Russia cast its latest veto Friday night on a last-ditch resolution by Japan to extend the mandate for 30 days for further discussions. It was supported ...
Security Council fails at fresh attempt to renew panel investigating chemical weapons use in SyriaUN News Centre
Security Council Considers 30-day Extension on Syria ExpertsVoice of America
The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME

all 599 news articles »

UN News Centre

At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
UN News Centre
17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

and more »

Computerworld

Strong and stable: The iOS security guide
Computerworld
So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...

and more »

KING5.com

Seattle police plan security for tree lighting ceremony
KING5.com
Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...

Google News

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More