• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

How to Strategically Plan a Safe Password?

June 1, 2019Simeon Georgiev

We have all been through this phase where we have made our names adding “123” our passwords, which is not really cool. Such passwords are very easily recognizable and can be cracked easily. This is why it is always suggested to use complex and strong passwords. Some websites have it in them that mentions whether our password is strong, medium or weak. Others often command us not to enter our first name or consecutive numbers in a password. We, being super lazy do not usually follow these rules and always come up with our own satisfactory passwords that we can remember easily.

Following are a few tips that are very important for every one of us to follow to have a secure password.

Make a long password:

Decide a phrase, myth, proverb or any daily life sentence that you say too much or anything that only you know about. It is very easy for hackers to get normal passwords that include birthdays, phone numbers or names. So it is suggested to use long passwords so it takes hackers more time to get into your account and even if they enter you’d know it because of them trying multiple times.

Don’t use personal information:

Our personal information is always available on different networking sites. It can be extracted very easily and used against us. Information such as phone numbers, date of birth, age or name of high school can be very easily discovered. Also, in the case of selecting a security question for your account, choose a question that has an answer only you are aware of.

Use numbers, symbols, letters, upper case, and lower case alphabets:

We have often come across websites that suggest us to use passwords with all the above categories. Although these passwords are too complex to remember, they are way secure than our usual passwords.  You can simply use a phrase for your password and capitalize the first letter of each word.

Use multi-factor authentication:

Many websites offer this verification method when you log in from a different device. They send us a verification code on your number or email every time you log in from a different device. It secures and prevents your account from getting hacked because you always get to know about the time and place your account was tried to open and you got the verification code, but you were not the one logging into it.

Do not reuse passwords:

It is always suggested to have different passwords for different sites and accounts. If someone guesses your password for a Gmail account, then he should not reach your Facebook account. Use distinctive passwords for each account.

Also, it is recommended to change your passwords on a regular basis.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post How to Recover from a Ransomware Attack? Next post Emergency Measures to Take After Being Hacked

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.