Password Management is More Important Than You Think
Password Management is More Important Than You Think
Personal Data Protection
Series 3 of 6
Passwords
Strong passwords keep apps and online services secure.
Layer 8 Security wants our community to be safe with their personal information by playing it smart. Please pass this information along to co-workers, family and neighbors. These recommendations will benefit not only yourself but also your workplace.
Passwords are a key component of keeping yourself protected from bad guys trying to steal your personally identifiable information (PII). One little girl has figured out a formula for strong personal passwords. Check out this sixth-grader whose business is to create passwords…
Password Management is another key to online safety and data security. With the profusion of apps, websites and networks, all asking for a password, it is easy to fall into the habit of password reuse or transformation (changing password to password1 or passwordA). But if a hacker secures one password, he now has the keys to your kingdom. Here are some steps to password management:
- Don’t reuse passwords
- Change your passwords
- Strong passwords need only be changed every 6 months to a year, but they have to be strong! Here’s why: https://www.wired.com/2016/03/want-safer-passwords-dont-change-often/
- Frequently changed weak passwords are a security threat
- Never share your password
- Use a long key so it cannot be cracked
- Passwords should include:
- Upper and lowercase Alphanumeric characters
- Special characters
- At least 12 characters long
- No words from the dictionary
- Example: 1L0ov3d0gg1es!!@*
- Passwords should include:
Use of a good password management software will help eliminate “password fatigue.” PC magazine recommends “Last Pass,” but get what fits your needs best.
If you are interested in learning more about phishing, cyber crimes, cybersecurity and how to create a resilient business, please contact us at: contact@layer8cybersecurity.com
If you missed any part of the Personal Data Protection blog series, please read past episodes here: Blog
BACK TO BLOGS