A password is a word or set of characters used to authenticate user identity and access a resource. A computer user has passwords to log into accounts to retrieve emails, access databases, websites, apps and networks.
The usage of passwords dates back in time with words like ‘open sesame’, which has made its way into folklore and movies.
What is your password? Do you know that the strength of your password may increase or decrease your chances of being hacked?
Do you know that passwords usually have to be above 6 characters? The ideal password is 12 characters long because the harder it is, the more likely hackers won’t be able to come up with it.
Here are some tips for picking a password:
- Use a combination of words and letters in different cases e.g. MAxiMuS007.
- Avoid using real words, and words that can be found in the dictionary and easily deciphered. Also avoid words like sunshine, rainy, and independence.
- Do not use your name, kid’s names, car name, date of birth, or zodiac sign.
- Never use a password twice, have different passwords for different accounts. (This is risky because most people tend to forget their passwords.) It is advisable to have a notebook or diary where the passwords will be written.
- Do not keep your passwords where they can be easily accessed. E.g. behind a photo frame, under the computer’s keyboard, your email etc.
Here is SplashData’s list of worst passwords, if you find one of your passwords on the list; it would be prudent to promptly change it.
I am too lazy to think about a password
But you asked me for it?
I wanted to use “123456,” but the computer said I had to use at least eight characters.
Right here on my keyboard
I have a kid in kindergarten
I can’t think straight right now
No, you hate your account
You should be fired
You should be fired immediately
I can’t be bothered
Are you a monkey?
The sun won’t shine when you are hacked
I am so smart
I write computer codes for a living, all I see are 0s and 1s.
Banks and other data sensitive companies are putting security measures in place to minimize online security breaches with two step authentication processes like biometric identification and computer generated OTPs. Before this, the first step is to have a foolproof personal password.
Related
You might also like:
This article was first published on 30th June 2014
Comments (0)