SlideShare a Scribd company logo
1 of 4
Password


Security
Do you think, you know everything about password security?
Most of us become most vulnerable online due to password
breach…even the security conscious paranoid of us out there.
Websites tell us to use all numbers or use upper and lower case
combination or different things to make the password secure. But
does it really make a password secure? A password like
„Bka5234JS7j8pol‟ does not promise complete protection. What
the websites actually tell us are good guidelines towards creating
passwords, which are safe.

What makes a password safe, anyway?
A safe password is the one that somebody cannot guess easily or
guess from the information available to him about you.

Whom are we protecting our passwords from?
Most of us have the misguided notion that we are protecting our
accounts through these passwords from strangers and malicious
hackers. We focus on creating passwords that strangers will not
be able to break. This is wrong! You should be more concerned
about protecting your password from people who know you or
have information about you. It is 80% people around us who
break into our accounts, rather than hackers.

Passwords NEVER to have
Before we start thinking about making complicated and difficult
passwords, here are few passwords, which are ridiculously
obvious. Nobody should ever have the following passwords:
   Have the password be “password.”
   Use his or her Birthday as the password– seriously, anyone
   can find this out.
   Use their anniversary date, or graduation date as the
   password.
   Use their area code, address or phone number as the
   password
Use the name of their spouse, significant other or crush as a
    password.
    Use their favorite color, favorite band, or any sort of passion
    as a password.
    Have the password “thisisnotapasswordlol” as a password.
Things that we love are the biggest open secret of our lives and it
takes no effort to guess it. Personal information can be found
easily. Your address is not a secret, your phone number is not a
secret and your favorite food is not a secret.

Most important password rule
The most important rule is forgotten most easily. Don‟t tell
anybody your password, not even your spouse. If your password
is known to anybody, then it is not safe anymore. If for some
reason you just have to tell your password, then change it
immediately after the work is done. Change password for all sites
that are identical.

So what password is safe?
A password doesn‟t necessarily have to be complicated. It has to
be unpredictable. Your password is safe with or without 3
numbers and 2 capital letters as long as nobody can guess it. Of
course it helps to add random numbers and capitals. Make sure
you can remember it. Do not write it down.

Password Protection
Here is an infographic stating the password breaches and the
basic guidelines each one of us can follow to keep our accounts
secure.
Password security

More Related Content

More from iYogi

6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
iYogi
 
Worm
WormWorm
Worm
iYogi
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
iYogi
 

More from iYogi (20)

Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales ppt
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaine
 
Worldwideweb
WorldwidewebWorldwideweb
Worldwideweb
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITER
 
Worm
WormWorm
Worm
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn c
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn b
 
Electronic brains
Electronic brainsElectronic brains
Electronic brains
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie c
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy l
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy w
 
Dianna l
Dianna lDianna l
Dianna l
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer review
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogi
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Password security

  • 2. Do you think, you know everything about password security? Most of us become most vulnerable online due to password breach…even the security conscious paranoid of us out there. Websites tell us to use all numbers or use upper and lower case combination or different things to make the password secure. But does it really make a password secure? A password like „Bka5234JS7j8pol‟ does not promise complete protection. What the websites actually tell us are good guidelines towards creating passwords, which are safe. What makes a password safe, anyway? A safe password is the one that somebody cannot guess easily or guess from the information available to him about you. Whom are we protecting our passwords from? Most of us have the misguided notion that we are protecting our accounts through these passwords from strangers and malicious hackers. We focus on creating passwords that strangers will not be able to break. This is wrong! You should be more concerned about protecting your password from people who know you or have information about you. It is 80% people around us who break into our accounts, rather than hackers. Passwords NEVER to have Before we start thinking about making complicated and difficult passwords, here are few passwords, which are ridiculously obvious. Nobody should ever have the following passwords: Have the password be “password.” Use his or her Birthday as the password– seriously, anyone can find this out. Use their anniversary date, or graduation date as the password. Use their area code, address or phone number as the password
  • 3. Use the name of their spouse, significant other or crush as a password. Use their favorite color, favorite band, or any sort of passion as a password. Have the password “thisisnotapasswordlol” as a password. Things that we love are the biggest open secret of our lives and it takes no effort to guess it. Personal information can be found easily. Your address is not a secret, your phone number is not a secret and your favorite food is not a secret. Most important password rule The most important rule is forgotten most easily. Don‟t tell anybody your password, not even your spouse. If your password is known to anybody, then it is not safe anymore. If for some reason you just have to tell your password, then change it immediately after the work is done. Change password for all sites that are identical. So what password is safe? A password doesn‟t necessarily have to be complicated. It has to be unpredictable. Your password is safe with or without 3 numbers and 2 capital letters as long as nobody can guess it. Of course it helps to add random numbers and capitals. Make sure you can remember it. Do not write it down. Password Protection Here is an infographic stating the password breaches and the basic guidelines each one of us can follow to keep our accounts secure.