For data and financial protection and security, SmallBusiness.com recommends using a password management application and two-step password verification. For reasons we can’t understand, many small businesses use neither If you are among those holdouts, at least be smarter when selecting passwords. Here are some tips from the U.S. Department of Homeland Security for choosing a good password.


The proliferation of passwords

From PINs to passwords, think of all the combination of letters and numbers you have to use for getting money from the ATM or using your debit card in a store, logging on to your computer or email, signing in to an online bank account or shopping cart. The list seems to just keep getting longer.

How to choose a password

DON’T | Don’t use passwords based on personal information like addresses, pet names, phone numbers, birthdays or the last four digits of your Social Security number. Why? Such information is easy to find on the internet.

DON’T | Don’t make a dictionary word your password. Why? While most services don’t allow multiple guesses, some still do. Software exists that can try to crack your password by using every word in the dictionary.

DO | While a password management application will provide you passwords with long and nearly impossible to remember strings of letters and numbers, if you choose to create your own password, use memory techniques (mnemonics) that will be difficult for a hacker to guess but easy for you to remember.

Example | Instead of using the word “hoops” as a password, instead us “ILTpbb” for “[I] [l]ike [T]o [p]lay [b]asket[b]all.” Using both lowercase and capital letters adds another layer of obscurity.

DO | An even better approach is to use a combination of numbers, special characters, and both lowercase and capital letters.

Example | Change the example used above to “Il!2pBb.” and see how much more complicated it has become just by adding numbers and special characters. Why? Longer passwords are more secure than shorter ones because there are more characters to guess. For example, “This passwd is 4 my email!” would be a strong password because it has many characters and includes lowercase and capital letters, numbers, and special characters. You may need to try different variations of a passphrase—many applications limit the length of passwords, and some do not accept spaces.

DON’T | Avoid common phrases, famous quotations, and song lyrics. Don’t assume that now that you’ve developed a strong password you should use it for every system or program you log into. If an attacker does guess it, he would have access to all of your accounts. You should use these techniques to develop unique passwords for each of your accounts.

A review of tactics to use when choosing a password

  • Don’t use passwords that are based on personal information that can be easily accessed or guessed.
  • Don’t use words that can be found in any dictionary of any language.
  • Do Develop a mnemonic for remembering complex passwords.
  • Use both lowercase and capital letters.
  • Use a combination of letters, numbers, and special characters.
  • Use passphrases when you can.
  • Use different passwords on different systems.

How to protect your password

DON’T | Never leave your password someplace for people to find. Writing it down and leaving it in your desk, next to your computer, or, worse, taped to your computer, is just making it easy for someone who has physical access to your office.

DON’T | Never tell anyone your passwords, and watch for attackers trying to trick you through phone calls or email messages requesting that you reveal your passwords.

DON’T | Never use the same password on multiple accounts. Doing this means a criminal hacker will have access to multiple accounts.

DO |  Always remember to log out when you are using a public computer (at the library, an internet cafe, or even a shared computer at your office).

DO |  Change passwords regularly, at least monthly.

Share this post on your blog or via social media

Homeland Security Tips for Choosing Harder to Hack Passwords

(via: U.S. Computer Emergency Readiness Team)


ThinkStock

Related Articles

15
Passwords Are Stolen Everyday; How to Protect Yours From Being One of Them

Don’t wait until your password is stolen to follow these procedures.

16
How to Recognize and Avoid an Attempt to Crack Your Two-Step Verification Passwords

As attackers evolve, there are many steps businesses and consumers can take to protect themselves.

17
How Voice Recognition Software is Being Used to Detect Cyber Criminals

(In cyber crime), the weakest link is often the human. Software developers are trying to strengthen that link.

18
How to Avoid a New Cyber Attack Attempting to Access Small Business Bank  Funds

Cyber criminals are using a new attack against hundreds of small business employees.

19
Seven Resolutions for 2016 That Will Help Protect Your Small Business Computers

Simple steps you should take to help protect your computers and data in 2016.

20
Top Ten Free Antivirus Utilities For Your Small Business | 2016

PCMag.com has released its annual list of free antivirus utilities.

21
Most Small Businesses Have No Cyber Attack Response Plan

A survey reveals 80% of small business owners say their companies do not have a cyber attack response plan.

22
If Your Business Bank Account Gets Hacked, Your Bank May Blame You

For individual customers, banks must reimburse victims of cyber-fraud. For bank accounts of businesses, even one owned by one person, the same rule doesn’t apply.

23
Why You Should Still Use a Password Manager

A breach of a password management system provides another opportunity to explain how a password management service is better than other methods.

24
Advice From Google on Avoiding Scams Directed at Small Businesses

A wide range of warnings for avoiding scams from con-artists claiming to be from Google.

25
More Tips for Actively Managing Your Passwords

More helpful tips and ideas for managing your passwords.

26
What Small Business Customers Should Know and Do About the JPMorgan Chase Cyberattack

From the bank’s SEC filing and information provided on Chase.com, this is what is currently known about the cyberattack and what the bank is recommending to its customers.

27
How Hackers Use ‘Social Engineering’ and How to Prevent It

Following the recent wave of celebrities having online accounts hacked, here is an explanation of “social engineering,” part of the method the cyber criminals likely used.

28
Ten Tips From the FCC for Improving Your Small Business Cyber Security

Ways to improve your small business cyber security from the U.S. Federal Communications Commission.

29
Password Protection Advice from SmallBusiness.com

Username and password protection is an ongoing requirement for small businesses. Here is a roundup of helpful advice on internet security and password management that has appeared recently on SmallBusiness.com

30
Ebay Asks 145 Million Users to Change Passwords

Ebay is asking its 145 million users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords “and other non-financial data.”

31
What is Two-Step Verification and Why You Should Start Using Them

It’s incredibly easy and fast to use a two-step verification method to protect your online accounts. Here’s how they work and why you should use them.

32
How (and Why) to Use a Password Management Application

A lock on your front door doesn’t do you any good if you keep the key under the mat, just like the best security on the web won’t protect you if you have the same bad password on every site you visit.

33
How to Reduce the Odds of Being Hacked While Using Public Wifi

Getting in a solid work session at the local coffee shop may be a tempting idea, but it has its risks. Like getting your personal information stolen because you were careless on a public network.