Are you on Twitter? The social media site is the latest in a string of high profile password breaches, leaving its 320 million users vulnerable to hacking. Access to a user’s Twitter account is now more valuable to cyber criminals than their credit card details because of the entryway it provides into their accounts on other sites. This can be disastrous if you use the same password to access your internet banking, for example. As trite as it sounds, the best way to protect yourself online is to create a strong password. 

Avoid common passwords

According to SplashData, the most common password is 123456, followed by simply “password”. These are the first passwords a hacker will attempt to use. Look up the most common passwords online and avoid all of them. Similarly, don’t use anything easily identifiable with you, i.e. birthdays, sports teams, children’s names or pet names. Don’t assume substituting letters – “p455w0rd”, for example – will protect you. Hackers are savvy. 

 

Don't re-use passwords

Occasionally, websites will suffer major password breaches, in which their password databases are stolen and offered to the highest bidder. People are creatures of habit and tend to reuse passwords for multiple accounts. This is potentially disastrous because it compromises your password not just for the breached website, but for every account you use that password for. Protect yourself by using different passwords.

 

Use longer passwords

Passwords of 12-14 characters are harder to crack than shorter ones. If yours is even longer, all the better. It’s best to also use a mix of capital letters, numbers and symbols for optimum security. Just make sure it’s memorable to you.

 

Create a passphrase

Choose a string of words and turn them into an acronym. Don’t go with an obvious phrase like “I love you” or “cat in the hat”. Choose a sentence with numbers and symbols. For example, “my great uncle Greg works on thirteenth avenue and he earns fifteen dollars an hour” which gives you a password of “mguGwo13aahe$15ah”. Much harder to crack, but the sentence ensures it’s still memorable to you.

 

Two-Factor Authentication

Wherever possible opt for Two Factor Authentication (2FA). This is where you’re required to enter additional information after your username and password, usually a code provided by the website. This adds an extra level of security to your account. You can activate 2FA on popular websites including Facebook, Twitter and Paypal.

 

Consider your security questions

Finally, make sure you don’t betray a good password with a weak security question. If a hacker fails to guess your password, their next step will be to try your questions. You usually choose from a range of questions which might include your mother’s maiden name or the place you were born. These are spectacularly easy to guess, even if the hacker doesn’t know you. Your best bet is to make up a random answer, provided you can remember it. Alternatively, you could use a passphrase again. For example:

                Q: Where did you go to school?

                A: Iw2FvHS (“I went to Fairview High School”)

Matthew Newton
Matthew Newton
Operations Director, Oosha
legal hex image 2

“As trite as it sounds, the best way to protect yourself online is to create a strong password.”

Matt
RELATED ARTICLES

Windows 7 end-of-life is fast approaching – make sure your f...

As with all products, there will come a point when the manufacturers decide no more. The point when they no longer support or make further releases for the product. That moment is looming for Microsoft products...

Is the future of the legal cloud desktop Citrix free?

One of the most frequent conversations we've been having with legal sector IT Managers recently is how will the desktop evolve over the coming years? We all agree that from a user’s point of view the actual des...

How law firms can use the cloud to manage legacy software

Like so many industries, the legal sector has become increasingly reliant on its own specific technology stack - a collection of software and applications delivered via a mix of on-premise and cloud-based solut...

blog-subscribe-bg

Like what you see?

Join our mailing list to receive the latest insights on legal and accounting technology