Yes, we know constantly changing passwords across multiple online platforms for banking, work and social media is a pain in the neck. The constant struggle is creating a password you will remember vs one that is difficult to remember but hard to crack
Hackers can potentially gain access to your private accounts through very nontechnical means. Knowing your kids names and birthdates, your college or your anniversary might make it easy for a hacker to figure out your password without much effort.
Here are some common password mistakes you should avoid:
- Your kid’s name
- Always the same password
- Wedding anniversary
- Parts of your social security number.
Times have changed; protecting our online information and accounts requires a little more effort on our part to safely protect our online data. Luckily for us, there are now many tools available that we can deploy to help us generate and store protected passwords.
Use a password generator to create highly secure passwords that are difficult to crack or guess.
Characters to make sure you use for passwords.
- Always have at least some capital letters
- Special characters (@#%$)
- Include at least twelve characters
Many systems now have the ability to create random passwords on the fly while signing up for an account. When using systems that don’t offer this service consider using an independent password generator and management system.
Popular password generators
Make sure your password management system is using data encryption (industry standard AES-256 bit encryption) which never been cracked, and that your master password is not saved anywhere within the application.
The next generation of online account security will in time make passwords obsolete replacing them with biometric scans like fingerprint and retinal scans, but until this is fully implemented we need to make our passwords are as strong as possible to protect our personal information.
What is Biometrics?
Biometric identification refers to any technology that does one of two things: identifies you or authenticates your identity. For identification, an image is run against a database of images. For authentication, an image has to be accessed from the device to confirm a match. The latter is typically used for unlocking computers, phones, and applications.
Apple introduced its biometric identification with Apple’s home button fingerprint sensor in 2013, since then biometrics has expanded rapidly. MasterCard has plans to use your heartbeat data to verify purchases. Google’s Abicus Project plans to monitor your speech patterns, as well as how you type, to confirm that it’s really you on the other end of the smartphone.
All of these advancements are leading to a new age in personal security. Updating your passwords and keeping up with the changing times is now more important than ever to ensure you don’t fall victim to identity theft.