SlideShare a Scribd company logo
1 of 9
We live in a password-driven world, where
between six and twenty characters are the
key to whether you’re able to access your
data, communicate with friends, or make
your online purchases. We now know that
“password”, “iloveyou” and “123456″ are
some of the most common passwords in use.
Heartbleed, AndroidsmsSend are some of the
dangerous viruses discovered just a few
months back that allow intruders to explore
vulnerabilities in your computer and mobile,
to trick servers into getting hold of your
personal data.
Passwords should ideally be different for
every site, long and randomized enough to
stump even the cleverest of computers,
robots and devious humans. Follow these tips
and tricks to take total control of your terms
for access.
Tips for a Strong Password
Why make life easier for hackers by having the
same password to all of your important profiles
and accounts? A study by BitDefender showed that
75 percent of people use their e-mail password for
Facebook, as well. If one website password gets
cracked, it means the person with that info now
has access to all of your online accounts. So if you
share the same password for Amazon and
Facebook you can say goodbye to both funds and
friends. Update and change your password
regularly, maybe every six months.
Make sure your password is long
enough
Length is an advantage when it comes to your password.
The more characters there are in your password, the
more secure, so don’t be afraid to combine words.
Microsoft suggests that your password should be at
least eight characters in length. Most websites will have
some type of minimum requirement when creating a
password to ensure you don’t end up with an easy-to-
guess four character password. For example, I could
combine the first couple of letters of my family
members name to come up with a word, like if I take the
Simpson family- Bart, Lisa, Maggie, Marge and Homer,
my password could read BaLiMaMaHom.
Randomized words are more
secure
Don’t use common word or phrases even if it is
long. A randomized series of characters that include
a mix of letters, numbers and symbols make for a
secure password. Your password should contain a
variety of uppercase and lowercase letters, numbers
and symbols.
Make up a sentence
Security technologists recommend thinking of a
sentence you can easily remember. It is an excellent way
to come up with a strong password that’s difficult to
guess too. For example, take a sentence like “Jack and
Jill went up the hill,” Now take the first letter of each
word in the sentence, throw in some punctuation and
replace some of those letters with numbers for variety.
That sentence can be converted into a password like
this: JFw1utH!. Don’t tempt fate with “dareu2hackme”,
though.
Sing Song
Take a line of your favorite song and use the initial letters
of each word. “I’m all ’bout that bass, ’bout that bass, no
treble” would become “iabTBbTbNt”. Don’t sing it out
loud every time you go to login though, that would be a
dead giveaway.
Misspellings work
If you’re going to use words or phrases in your
password, misspelling them is a great way to make them
more difficult to guess. You can do this by adding
symbols and numbers in place of letters. For example, if
you want to use the phrase “I love basketball” in your
password, you should change it to something like
“1LuvBBall15″ to make it more secure.
Make The SMaRT
Choice
If you’re still unsure about what makes a strong
password different from a weak password, here are
some examples of passwords that are sure to be cracked
“admin,” “iloveyou” and “aaaaaa.” If it’s the name of
your relatives, your kids, or your pet, favorite team, or
city of your birth, your birthday, anniversary, even your
car license plate number, it’s not a strong password.
Above all don’t let your browser remember the
password for you because it is open to hackers. You’re
now ready to create your own strong passwords. Share
these tips with others but don’t share your passwords!
Check our Smart Technology Services blog for more tips
and articles, http://www.smartts.com/blog/

More Related Content

Recently uploaded

Recently uploaded (20)

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Tips for a strong password

  • 1.
  • 2. We live in a password-driven world, where between six and twenty characters are the key to whether you’re able to access your data, communicate with friends, or make your online purchases. We now know that “password”, “iloveyou” and “123456″ are some of the most common passwords in use. Heartbleed, AndroidsmsSend are some of the dangerous viruses discovered just a few months back that allow intruders to explore vulnerabilities in your computer and mobile, to trick servers into getting hold of your personal data. Passwords should ideally be different for every site, long and randomized enough to stump even the cleverest of computers, robots and devious humans. Follow these tips and tricks to take total control of your terms for access. Tips for a Strong Password
  • 3. Why make life easier for hackers by having the same password to all of your important profiles and accounts? A study by BitDefender showed that 75 percent of people use their e-mail password for Facebook, as well. If one website password gets cracked, it means the person with that info now has access to all of your online accounts. So if you share the same password for Amazon and Facebook you can say goodbye to both funds and friends. Update and change your password regularly, maybe every six months.
  • 4. Make sure your password is long enough Length is an advantage when it comes to your password. The more characters there are in your password, the more secure, so don’t be afraid to combine words. Microsoft suggests that your password should be at least eight characters in length. Most websites will have some type of minimum requirement when creating a password to ensure you don’t end up with an easy-to- guess four character password. For example, I could combine the first couple of letters of my family members name to come up with a word, like if I take the Simpson family- Bart, Lisa, Maggie, Marge and Homer, my password could read BaLiMaMaHom.
  • 5. Randomized words are more secure Don’t use common word or phrases even if it is long. A randomized series of characters that include a mix of letters, numbers and symbols make for a secure password. Your password should contain a variety of uppercase and lowercase letters, numbers and symbols.
  • 6. Make up a sentence Security technologists recommend thinking of a sentence you can easily remember. It is an excellent way to come up with a strong password that’s difficult to guess too. For example, take a sentence like “Jack and Jill went up the hill,” Now take the first letter of each word in the sentence, throw in some punctuation and replace some of those letters with numbers for variety. That sentence can be converted into a password like this: JFw1utH!. Don’t tempt fate with “dareu2hackme”, though.
  • 7. Sing Song Take a line of your favorite song and use the initial letters of each word. “I’m all ’bout that bass, ’bout that bass, no treble” would become “iabTBbTbNt”. Don’t sing it out loud every time you go to login though, that would be a dead giveaway.
  • 8. Misspellings work If you’re going to use words or phrases in your password, misspelling them is a great way to make them more difficult to guess. You can do this by adding symbols and numbers in place of letters. For example, if you want to use the phrase “I love basketball” in your password, you should change it to something like “1LuvBBall15″ to make it more secure.
  • 9. Make The SMaRT Choice If you’re still unsure about what makes a strong password different from a weak password, here are some examples of passwords that are sure to be cracked “admin,” “iloveyou” and “aaaaaa.” If it’s the name of your relatives, your kids, or your pet, favorite team, or city of your birth, your birthday, anniversary, even your car license plate number, it’s not a strong password. Above all don’t let your browser remember the password for you because it is open to hackers. You’re now ready to create your own strong passwords. Share these tips with others but don’t share your passwords! Check our Smart Technology Services blog for more tips and articles, http://www.smartts.com/blog/