The most effective way to keep from having your life turned upside down by someone hacking into one of your online accounts is to begin actively managing the passwords to all your accounts. Of course, that’s easier said than done when considering all the accounts you maintain. In the past, we have described two strategies that are relatively simple to use, but add greatly to the challenge a hacker will face if trying to break into your account:

Unfortunately, an alarming number of people still don’t take even the simplest password protection practices. So prevalent are lax password security, President Obama received robust laughter recently when he joked about passwords in an address to tech security leaders attending a recent conference.

PRESIDENT OBAMA: It’s just too easy for hackers to figure out usernames and passwords – like password.
(LAUGHTER)
(OBAMA: Or 1, 2, 3, 4, 5 – 7
(LAUGHTER)
OBAMA: Those are some of my previous passwords.

According to security experts, the core problem with passwords is the trade-off between security and convenience. Simply making a password more complex can actually backfire because it becomes impossible to remember, reports NPR’s Yuki Noguchi.

“Passwords are the worst system in the world — except for all the other systems,” Cormac Herley, principal researcher with Microsoft Research, an arm of the software giant, told Noguchi. Herley recommends assigning different tiers to passwords. Using your best, most complex ones for work and banking, but devoting less effort to those that don’t matter as much.

The worst passwords

Each year, SplashData, a provider of password management products, releases the top 25 most used passwords appearing on lists of stolen passwords released on the internet throughout the year. Just glancing down the 2014 list can reveal why so many people have their accounts hacked:

  1. 123456 (Unchanged from 2013)
  2. password (Unchanged)
  3. 12345 (Up 17)
  4. 12345678 (Down 1)
  5. qwerty (Down 1)
  6. 1234567890 (Unchanged)
  7. 1234 (Up 9)
  8. baseball (New)
  9. dragon (New)
  10. football (New)
  11. 1234567 (Down 4)
  12. monkey (Up 5)
  13. letmein (Up 1)
  14. abc123 (Down 9)
  15. 111111 (Down 8)
  16. mustang (New)
  17. access (New)
  18. shadow (Unchanged)
  19. master (New)
  20. michael (New)
  21. superman (New)
  22. 696969 (New)
  23. 123123 (Down 12)
  24. batman (New)
  25. trustno1 (Down 1)

Simple password do’s and don’ts

If you didn’t follow our previous suggestions regarding two-step authentication or password management systems, here are some dos and don’ts from SplashData and others on protecting your passwords:

  • Don’t use simple patterns on your keyboard such as “qwertyuiop,” which is the top row of letters on a standard keyboard, or “1qaz2wsx” which comprises the first two ‘columns’ of numbers and letters on a keyboard.
  • Don’t use a favorite sport or team name as your password.
  • Don’t use your birthday or especially just your birth year.
  • Don’t use children’s names as a password.
  • Don’t use the same password on multiple accounts. If you do, it’s like having all your cash and credit cards in one wallet, and having the wallet stolen.
  • Don’t use swear words and phrases, hobbies, famous athletes, car brands, and movie names.
  • Do use passwords of eight characters or more with mixed types of characters.
  • Do change passwords often — at least once a month on any account that can be used to withdraw money or make purchases.

How to create a password using a “password phrase”

Here is a suggestion for how to create a password from Norton, the internet security company.

  1. Create a password phrase. For this example, we’ll  use the phrase: “I like to support local shops.”
  2. Convert your phrase to an abbreviation by using the first letters of each word and changing the word “to” to a number “2.” Using the example phrase:il2sls
  3. Put the first and last letter of the website you are using as the first and last letters of your password phrase, and capitalize the last letter. For example, let’s use the first and last letters of “Google” with our phrase: gil2slsE

The advantage of using a pass phrase is that it is easy to remember since it’s something personal to you, but something you can make unique for each website requiring a password.

Related Articles

26
What Small Business Customers Should Know and Do About the JPMorgan Chase Cyberattack

From the bank’s SEC filing and information provided on Chase.com, this is what is currently known about the cyberattack and what the bank is recommending to its customers.

27
How Hackers Use ‘Social Engineering’ and How to Prevent It

Following the recent wave of celebrities having online accounts hacked, here is an explanation of “social engineering,” part of the method the cyber criminals likely used.

28
Ten Tips From the FCC for Improving Your Small Business Cyber Security

Ways to improve your small business cyber security from the U.S. Federal Communications Commission.

29
Password Protection Advice from SmallBusiness.com

Username and password protection is an ongoing requirement for small businesses. Here is a roundup of helpful advice on internet security and password management that has appeared recently on SmallBusiness.com

30
Ebay Asks 145 Million Users to Change Passwords

Ebay is asking its 145 million users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords “and other non-financial data.”

31
What is Two-Step Verification and Why You Should Start Using Them

It’s incredibly easy and fast to use a two-step verification method to protect your online accounts. Here’s how they work and why you should use them.

32
How (and Why) to Use a Password Management Application

A lock on your front door doesn’t do you any good if you keep the key under the mat, just like the best security on the web won’t protect you if you have the same bad password on every site you visit.

33
How to Reduce the Odds of Being Hacked While Using Public Wifi

Getting in a solid work session at the local coffee shop may be a tempting idea, but it has its risks. Like getting your personal information stolen because you were careless on a public network.