PASSWORD: Password

There is an old saying that “there are no shortcuts in life.”

While I am not sure who originally created that statement, I can’t help to assume they didn’t work from a computer—or if they did, they must have not known the power of the CTRL (control) button.

shortcut sign
03.05.2022

By: Shelby Beadle

Password: Password

We all know someone who has used the word “password” as their password. Or someone who uses one simple password with 1 capital letter and a few numbers for everything.

The reality is, that is a dangerous game.

Companies are experiencing data breaches at an increasing rate. Just this week, Expedia fell victim to a massive cyber-attack, and with every breach cybercriminals are able to obtain customer data.

So what does that have to do with passwords?

Everything.

Let’s say you are using your primary email address and the password “XYZ” and create an account with Expedia (or any site, really), and a hacker gets ahold of that information. If you are using that same email address and password combination for your bank account, home security app, social media accounts, a subscription service, or another retail site, the hacker now has access to those too. They can likely transfer your assets, steal credit card numbers, find your home address, and more.

It is safe to assume that no one wants to be caught in that scenario, so here is what we suggest:

  • Never reuse passwords. Have a unique password for every account you have.
  • Use passphrases instead of passwords. Instead of “Example456” we recommend something like “Ac@tsat1nthew!indow0NTues456”
  • Use a secure password storage to save all your unique passphrases in one place. We really like LastPass.
  • Stay on top of potential data breaches. Go to https://haveibeenpwned.com/ periodically to see if your email address has been compromised in a data breach.

Subscribe to Our Newsletter

Related Posts

Building a Culture of Cybersecurity

Building a Culture of Cybersecurity

Cybersecurity can be underestimated, and cybersecurity importance must be prioritized from the top down and back up again. Cybersecurity must be woven into the culture of your workplace.

So, how do you foster a cybersecurity culture within the entire organization?

It’s Time for A Mid Year Assessment

It’s Time for A Mid Year Assessment

Now is a perfect time to begin assessing where you are in your businesses and preparing for next year’s goals and objectives. While doing so, how are you planning for cybersecurity risks, technology needs and the ever changing landscape that businesses are experiencing in 2022?

About the Author

Ted Clouser

Comments

0 Comments