SlideShare a Scribd company logo
1 of 9
We live in a password-driven world, where
between six and twenty characters are the
key to whether you’re able to access your
data, communicate with friends, or make
your online purchases. We now know that
“password”, “iloveyou” and “123456″ are
some of the most common passwords in use.
Heartbleed, AndroidsmsSend are some of the
dangerous viruses discovered just a few
months back that allow intruders to explore
vulnerabilities in your computer and mobile,
to trick servers into getting hold of your
personal data.
Passwords should ideally be different for
every site, long and randomized enough to
stump even the cleverest of computers,
robots and devious humans. Follow these tips
and tricks to take total control of your terms
for access.
Tips for a Strong Password
Why make life easier for hackers by having the
same password to all of your important profiles
and accounts? A study by BitDefender showed that
75 percent of people use their e-mail password for
Facebook, as well. If one website password gets
cracked, it means the person with that info now
has access to all of your online accounts. So if you
share the same password for Amazon and
Facebook you can say goodbye to both funds and
friends. Update and change your password
regularly, maybe every six months.
Make sure your password is long
enough
Length is an advantage when it comes to your password.
The more characters there are in your password, the
more secure, so don’t be afraid to combine words.
Microsoft suggests that your password should be at
least eight characters in length. Most websites will have
some type of minimum requirement when creating a
password to ensure you don’t end up with an easy-to-
guess four character password. For example, I could
combine the first couple of letters of my family
members name to come up with a word, like if I take the
Simpson family- Bart, Lisa, Maggie, Marge and Homer,
my password could read BaLiMaMaHom.
Randomized words are more
secure
Don’t use common word or phrases even if it is
long. A randomized series of characters that include
a mix of letters, numbers and symbols make for a
secure password. Your password should contain a
variety of uppercase and lowercase letters, numbers
and symbols.
Make up a sentence
Security technologists recommend thinking of a
sentence you can easily remember. It is an excellent way
to come up with a strong password that’s difficult to
guess too. For example, take a sentence like “Jack and
Jill went up the hill,” Now take the first letter of each
word in the sentence, throw in some punctuation and
replace some of those letters with numbers for variety.
That sentence can be converted into a password like
this: JFw1utH!. Don’t tempt fate with “dareu2hackme”,
though.
Sing Song
Take a line of your favorite song and use the initial letters
of each word. “I’m all ’bout that bass, ’bout that bass, no
treble” would become “iabTBbTbNt”. Don’t sing it out
loud every time you go to login though, that would be a
dead giveaway.
Misspellings work
If you’re going to use words or phrases in your
password, misspelling them is a great way to make them
more difficult to guess. You can do this by adding
symbols and numbers in place of letters. For example, if
you want to use the phrase “I love basketball” in your
password, you should change it to something like
“1LuvBBall15″ to make it more secure.
Make The SMaRT
Choice
If you’re still unsure about what makes a strong
password different from a weak password, here are
some examples of passwords that are sure to be cracked
“admin,” “iloveyou” and “aaaaaa.” If it’s the name of
your relatives, your kids, or your pet, favorite team, or
city of your birth, your birthday, anniversary, even your
car license plate number, it’s not a strong password.
Above all don’t let your browser remember the
password for you because it is open to hackers. You’re
now ready to create your own strong passwords. Share
these tips with others but don’t share your passwords!
Check our Smart Technology Services blog for more tips
and articles, http://www.smartts.com/blog/

More Related Content

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Tips for a strong password

  • 1.
  • 2. We live in a password-driven world, where between six and twenty characters are the key to whether you’re able to access your data, communicate with friends, or make your online purchases. We now know that “password”, “iloveyou” and “123456″ are some of the most common passwords in use. Heartbleed, AndroidsmsSend are some of the dangerous viruses discovered just a few months back that allow intruders to explore vulnerabilities in your computer and mobile, to trick servers into getting hold of your personal data. Passwords should ideally be different for every site, long and randomized enough to stump even the cleverest of computers, robots and devious humans. Follow these tips and tricks to take total control of your terms for access. Tips for a Strong Password
  • 3. Why make life easier for hackers by having the same password to all of your important profiles and accounts? A study by BitDefender showed that 75 percent of people use their e-mail password for Facebook, as well. If one website password gets cracked, it means the person with that info now has access to all of your online accounts. So if you share the same password for Amazon and Facebook you can say goodbye to both funds and friends. Update and change your password regularly, maybe every six months.
  • 4. Make sure your password is long enough Length is an advantage when it comes to your password. The more characters there are in your password, the more secure, so don’t be afraid to combine words. Microsoft suggests that your password should be at least eight characters in length. Most websites will have some type of minimum requirement when creating a password to ensure you don’t end up with an easy-to- guess four character password. For example, I could combine the first couple of letters of my family members name to come up with a word, like if I take the Simpson family- Bart, Lisa, Maggie, Marge and Homer, my password could read BaLiMaMaHom.
  • 5. Randomized words are more secure Don’t use common word or phrases even if it is long. A randomized series of characters that include a mix of letters, numbers and symbols make for a secure password. Your password should contain a variety of uppercase and lowercase letters, numbers and symbols.
  • 6. Make up a sentence Security technologists recommend thinking of a sentence you can easily remember. It is an excellent way to come up with a strong password that’s difficult to guess too. For example, take a sentence like “Jack and Jill went up the hill,” Now take the first letter of each word in the sentence, throw in some punctuation and replace some of those letters with numbers for variety. That sentence can be converted into a password like this: JFw1utH!. Don’t tempt fate with “dareu2hackme”, though.
  • 7. Sing Song Take a line of your favorite song and use the initial letters of each word. “I’m all ’bout that bass, ’bout that bass, no treble” would become “iabTBbTbNt”. Don’t sing it out loud every time you go to login though, that would be a dead giveaway.
  • 8. Misspellings work If you’re going to use words or phrases in your password, misspelling them is a great way to make them more difficult to guess. You can do this by adding symbols and numbers in place of letters. For example, if you want to use the phrase “I love basketball” in your password, you should change it to something like “1LuvBBall15″ to make it more secure.
  • 9. Make The SMaRT Choice If you’re still unsure about what makes a strong password different from a weak password, here are some examples of passwords that are sure to be cracked “admin,” “iloveyou” and “aaaaaa.” If it’s the name of your relatives, your kids, or your pet, favorite team, or city of your birth, your birthday, anniversary, even your car license plate number, it’s not a strong password. Above all don’t let your browser remember the password for you because it is open to hackers. You’re now ready to create your own strong passwords. Share these tips with others but don’t share your passwords! Check our Smart Technology Services blog for more tips and articles, http://www.smartts.com/blog/