Password Protection Checklist: Protect Your Data
Password protection can protect data on all your devices, laptops, computers, tablets and smartphones. These devices give us quick access to essential data and passwords can prevent unauthorised users accessing those devices.
These devices are essential part of life and such a huge aid for business as they can hold business-critical data with easy access wherever you are in the World. This makes them a prime target for criminals so you need to protect them.
There are a number of steps you can take to protect your personal data and your business data from unauthorised access, and make not so easy to hack by cybercriminals.
Key areas where hackers can take advantage include breached data, poor password decision, or authentication methods.
Do you know what ways you can help protect yourself from hackers and cyber attacks?
Password Choice is Important
For instance the length and complexity of your password can reduce your risk “brute force attack.” This is a process where a computer program runs every possible combination of letters, numbers, and symbols to crack your password. By increasing the length, varying symbols and including random words or phrases can strengthen password protection against password discovery. If your word and letter combinations or phases are not published in a dictionary or literature they will be stronger. If you spell something wrong or are grammatically correct, they will be harder to break.
Remember passwords that are only three characters long can take less than a second to break.
Steer away from obvious personal information that could be easily discovered with a quick social media search. Dont include your or your children’s birthdays, special anniversaries, place of birth, and pets’ names these only make easier to guess.
If you are asked to choose security questions and answers select the least obvious one mother’s maiden name is very easy to find out these days.
Password Protection Checklist
Activate Additional Protection
Turn on a screen lock password, PIN number, and biometrics security like fingerprint or face unlock and any other authentication methods.
Passphrases over Passwords
When creating a passwords think about creating long passwords based on memorable phrases are better over short complex passwords.
Strong passwords makes it’s harder to break in and steal your data by simply cracking your password.
Two-Factor Authentication or 2FA
2FA requires two different methods to ‘prove’ your identity before you get granted access.
When setting up your 2FA, you should use 2FA applications over SMS/Text based systems.
Passwords should be easy to remember but randomly include symbols, capitalising and numbers with the letters. Length is important long passwords are great; including random words and phrases are even better.
Avoid using the most common passwords like “123456”, “password” and characters sequential on a keyboard like “qwerty.”
Avoid user personal information like birthday, address, anniversary, pet name as they are easily discoverable
Password manager an online tool that auto-generate and store strong passwords on your behalf. Storing all these passwords in an encrypted, centralised location which is only accessible via a ‘master’ password.
Examples: 1password.com, Lastpass
Different Passwords for Different Applications
Every online application should have a different password. This prevents a single compromised password allowing someone to login to every web application that your credentials could authenticate to.
Password Protection Tips
- Never give your passwords to anyone else.
- Never type in a password in plain sight of others.
- Avoid writing down passwords or creating password hint sheet
- Dont email them to yourself
- If creating a document file, consider name convention, make it something random so it isn’t a dead giveaway.
- Dont use the same password everywhere because it will make it simpler to compromise all your accounts.Use unique passwords for everything!
- Consider signing up to have i been pwned? to track if your data has been compromised in a data breach.
- Avoid using the most common passwords.
- Beware of signs of phishing and phishing attacks.
- Computer malware
- Think about phone security.