Six best practices for creating secure passwords

June 2019 Home Security, Cyber Security

On May 2, we celebrated World Passport Day. The goal is to promote better cybersecurity hygiene by upgrading easy-to-guess passwords or refreshing older passwords that may have been compromised through some data breach. Think of it as the cyber equivalent of testing and replacing the batteries in your car’s key remote.

 Doros Hadjizenonos
Doros Hadjizenonos

According to the Verizon Data Breach Investigation Report, 81% of breaches leveraged either stolen and/or weak passwords. That problem is compounded because one of the biggest risks to data security is the reuse of passwords across accounts. If one of your accounts is compromised and your user name and password are posted on the dark web, cybercriminals who know how often passwords are reused will simply begin to plug that information into other possible accounts until they unlock one that uses the exact same credentials.

This is a common risk, as 83% of people have admitted to reusing passwords across multiple sites. Even if you think it is safe to reuse passwords on accounts that don’t house sensitive data – a breach there can be used as an entryway to move laterally across networks in search of critical business data or personally identifiable information (PII).

What constitutes a weak password?

Short, simple passwords take fewer resources for hackers to compromise. In fact, hackers maintain databases of the most common words, phrases, and number combinations that they can run your password through to find a quick match.

Some of the most common passwords are baseball and football team names, any variant of 123456789, and QWERTY. Avoid using common password themes when creating a passphrase, such as the following:

• Birthdays.

• Phone numbers.

• Names including movies and sports teams.

• Simple obfuscation of a common word (‘P@$$w0rd’).

How to minimise password-based cyber risk

When creating new accounts or updating well-used passwords, keep these six best practices in mind to minimise password-based cyber risk.

1. To add an extra layer of security, use multi-factor authentication wherever possible. This confirms your identity by utilising a combination of multiple different factors, such as something you know or something they have, such as a token generator on your smartphone.

2. Never repeat the same password for different accounts.

3. Change your passphrase at least every three months. This will lock out cybercriminals who may be using your account, protect you from brute force attacks, and remedy the issue caused by cybercriminals who purchase lists of usernames and passwords obtained through data breaches.

4. Ensure no one is watching as you enter passwords.

5. Be cautious when downloading files from the internet as they may contain key loggers as well as password grabber malware variants that will compromise your password. A good practice is to regularly scan for the presence of such malware.

6. Use a cloud-based password manager to enable you to create and store strong passphrases. This is especially important if you require strong passwords for dozens of accounts. Password management tools allow you to securely store an encrypted list of passwords in the cloud that can be accessed from any device. Not only will you only need to remember one password to access your password locker, the passwords you store there for your various accounts can be even stronger because you don’t have to remember them.

When it comes to password security, everyone has a role to play in the protection of PII and corporate data. IT teams and stakeholders should review the common risks of weak passwords with their organisations, as well as remind everyone of these best practices. This simple practice can help employees better protect their data, while minimising unintentional insider threats to the organisation.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The 4th Industrial Revolution
July 2019, Wolfpack Information Risk , Editor's Choice, Cyber Security, Security Services & Risk Management, Industrial (Industry)
Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril.

Read more...
Four essential cloud security concepts
July 2019 , Cyber Security, IT infrastructure
Security is a critical a component of any cloud environment, but to be effective, it needs to be as agile and dynamic as the cloud infrastructure being protected.

Read more...
Cyber-attacks target operational technology
July 2019 , Editor's Choice, Cyber Security, Industrial (Industry)
Focus on operational technology security increasing as around 74% of OT organisations come under attack in the past year, finds a new Fortinet report.

Read more...
Industrial cybersecurity delivers ROI
July 2019, Kaspersky Lab , Industrial (Industry), Cyber Security
Industrial company achieves 368% ROI with Kaspersky Industrial CyberSecurity reveals global research and advisory firm.

Read more...
SA industrial facilities at risk of cyber attacks
July 2019 , Industrial (Industry), Cyber Security
With international analysts warning of a growing risk of cyber war, sabotage and espionage impacting industrial and mining facilities, South African stakeholders must step up their efforts to mitigate risk.

Read more...
National Home Security Month awards
July 2019, Yale Security (SA) , Home Security, CCTV, Surveillance & Remote Monitoring
National Home Security Month (NHSM) aims to create awareness around the importance of good home security, and how we can ensure our homes and families remain safe.

Read more...
Top ten tips to stay safe
July 2019, Yale Security (SA) , Home Security, Security Services & Risk Management
Yale Security offers Hi-Tech Home Security reader a few tips to help ensure your home remains a safe haven.

Read more...
Critical vulnerabilities in smart home controller
July 2019, Kaspersky Lab , Home Security, Cyber Security
Kaspersky researchers investigating the control device for an active smart home ecosystem have identified several critical vulnerabilities.

Read more...
Smart Living Home App updated
July 2019, Yale Security (SA) , Home Security, Integrated Solutions
SKF Cooper split bearingsAn upgraded Yale Smart Living Home app has just launched with a range of improved features, enhancing the control of connected locks, alarms and cameras as well as a smarter interface to provide a seamless user experience.

Read more...
Where are your crown jewels?
June 2019, Wolfpack Information Risk , Commercial (Industry), Cyber Security, Security Services & Risk Management
Understanding what data they store and analyse is gaining increasing urgency for organisations that are now accountable to new(ish) privacy regulations such as the GDPR and our PoPIA.

Read more...