How to create a strong password

How to create a strong password


Best passwords will thwart brute force and dictionary attacks. It’s also possible to make them easy to remember. Try these password ideas to make your accounts unbreakable. Cybercriminals have several password-hacking tactics at their disposal, but the easiest one is simply to buy your passwords off the dark web. Phishing is when cybercriminals try to trick, intimidate, or pressure you through social engineering.

A phishing email may tell you (falsely) that there’s something wrong with your credit card account. Phishing scams can try to ensnare you through phone calls too. Never use sequential numbers or letters, and for the love of all things cyber, do not use “password” as your password. Use a mix of characters – the more you mix up letters, numbers and symbols, the harder it is for a brute force attack to crack it. Choose bizarre and uncommon words to make it hard for hackers to guess your password.

Use a password manager and a random password generator to help you strengthen your passwords. Use the “Bruce Schneier Method” to turn a random sentence into a password. PC Magazine has a series of recommendations of password managers.

Click here to check out the full article!

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 

Before you leave, grab our Business Cybersecurity Checklist

Start checking items off your business cybersecurity list today!

Every business needs to expect and prepare for a cybersecurity crisis. Our checklist helps you gauge risk and put plans in place to improve your business's cyber security status.

Read the checklist to find out the next 11 steps you can take to:

  • Identify risks
  • Protect your assets
  • Plan for the worst

Planning ahead can help simplify your recovery and make it happen sooner. Don't wait for a crisis. Start checking off this cybersecurity to-do list today.

Ready to feel confident with your company's cybersecurity?

Please fill out the following information to receive a free cybersecurity checklist:

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.