5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake.

There are certain specific guidelines you need to follow to choose a safe and secure password. Use the following tips as a "how to" on making your password secure.

1. Your password must be alphanumeric. That simply means a mixture of numbers and letters such as xpf2778z. Why? When a hacker tries to break into a system they often use what are called dictionary or brute force hacks. A dictionary hack is an application that simply uses standard words and word combinations in an attempt to guess your password. For example many computer users use the word "password" as their actual password. A dictionary hack would crack that password in a few moments. Using alphanumeric passwords increases the number of possible password combinations by millions.

2. It should be 6 - 8 characters in length. The longer the password the harder it is for a hacking program to get around. If your password was abc then there are 6 possible password combinations. If your password was abc123 there are now over 720 password combinations possible. If your password was abc1234 there are now almost 6,000 possible combinations. Never, ever use a short password only comprised of letters.

3. Never use personal details in your password. People often use their home address, their age, husband or wives name, their social security number or their date of birth. These are incredibly easy to get access to by either a fellow employee or potential system hacker. Your password needs to be secure and hard to guess and personal details meet neither of these criteria.

4. Do not write your password down anywhere. Keeping a record of your password for somebody to find is as dangerous as keeping a copy of your ATM pin number in your wallet beside your ATM card. Create a memorable password that you'll have no problem recalling. This is not as hard as it sounds and if you jot some password ideas down you'll quickly come up with some good ones. Obviously burn the piece of paper you jotted your ideas down on.

5. Do not use the same password for more than 90 days. Create several variants of the same password and recycle them every 60 - 90 days. This adds an extra layer of security to your data. By recycling your password frequently you make your data 1000% more secure. You'll notice that most large corporates force their employees to change their password every month for this exact reason.

Hopefully these tips will help you choose a password that's both safe and secure and that you'll have some fun creating your new passwords too!

If you need a review of the spam blocker you intend buying then check out Spam-Site.com for spam blocker reviews.

In The News:


Aljazeera.com

Milo Yiannopoulos' security cost UC Berkeley $800,000 | Far Right ...
Aljazeera.com
US university grappling with budget cuts and layoffs spends sum on security for far-right speaker's 15-minute rally.

and more »

Gizmodo

Source: Deloitte Breach Affected All Company Email, Admin Accounts
Krebs on Security
In its statement about the incident, Deloitte said it responded by “implementing its comprehensive security protocol and initiating an intensive and thorough review which included mobilizing a team of cyber-security and confidentiality experts inside ...
One of the World's Biggest Accounting Firms Hacked After Basic Security GoofGizmodo
Industry reactions to the Deloitte cyber attackHelp Net Security

all 88 news articles »

ZDNet

Microsoft adds new Microsoft 365 versions, plus security and management features
ZDNet
Microsoft is adding new Microsoft 365 bundles, and adding more features to these integrated Windows, Office 365 and Enterprise Mobiity + Security management and security subscription offerings. Microsoft introduced Microsoft 365 at its Inspire ...
Microsoft looks to the cloud to expand its security offeringsTechCrunch
Ignite 2017: Improving Security via the Microsoft's Intelligent Security GraphWindows IT Pro

all 188 news articles »

Forbes

Security Concerns Again Hang Over Winter Olympics
Forbes
The PyeongChang 2018 Olympic medals during their unveiling at a ceremony in Seoul on Sept. 21. (Photo by JUNG YEON-JE/AFP/Getty Images). North Korea ramped up its vitriol on Monday, undoubtedly increasing concerns by athletes who are preparing ...
South Korean Olympic chief downplays security concernsUPI.com

all 48 news articles »

Bloomberg

SEC Says It Told US Security Officials of Hack Months Ago
Bloomberg
The U.S. Securities and Exchange Commission told government cybersecurity officials about a hack into its database of corporate filings soon after it happened last year, months before the agency's new chairman made the breach public. Since disclosing ...

and more »

Daily Signal

Trump's New Travel Ban Is Standard Security Policy
Daily Signal
President Donald Trump's latest travel executive order restricts travel from seven countries that are known state sponsors of terrorism or have failed to work effectively with the U.S. against emerging threats. (Photo: Jonathan Ernst/Reuters /Newscom) ...
President Trump's New Travel Executive Order Has Little National Security JustificationCato Institute (blog)
White House expands travel ban, restricting visitors from eight countriesWashington Post

all 839 news articles »

cleveland.com

Cleveland Browns security guard robbed at gunpoint near FirstEnergy Stadium
cleveland.com
Darnell Hurt, an employee at Contemporary Services Corporation, which provides security for the Browns, said he was walking to the stadium to catch a bus that would take him and other employees to Indianapolis where they would provide security for the ...


Macworld

Report: Security hole in macOS Keychain puts passwords at risk
Macworld
Apple released macOS High Sierra on Monday, so it should be a nice way to spotlight the Mac this week after last week's iOS 11 and iPhone 8 releases. But a report by a security researcher at Synack puts a bit of a damper on the High Sierra release.
macOS High Sierra Automatically Performs Security Check on EFI Firmware Each WeekMac Rumors
Ex-NSA hacker drops macOS High Sierra zero-day hours before launchZDNet
High Sierra validates Mac firmware weekly, alerts users to possible security issuesAppleInsider (press release) (blog)

all 108 news articles »

East Bay Times

Safeway adds security, OKs arresting trespassers at downtown Concord store
East Bay Times
15 letter to Mayor Laura Hoffmeister, the supermarket chain responded to the city's concerns about shoplifting, trespassing and security at the downtown grocery store. Safeway confirmed plans to paint the building's exterior, evaluate the parking lot ...

and more »

WKRN.com

Church shooting suspect worked for security company less than 12 hours before Antioch attack
WKRN.com
NASHVILLE, Tenn. (WKRN) – The man arrested for the deadly shooting at an Antioch church Sunday applied for a security guard license Friday before the attack, and worked as a security guard Saturday night . Emanuel Samson attended a class for ...
Antioch Church Gunman Attended Unarmed Security Training Class Before AttackNewsChannel5.com
Alleged Antioch church gunman tried to renew security license days before shootingWZTV

all 618 news articles »
Google News

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More