top of page

DEEP DIVE - PASSWORDS

  • ShdwFacts
  • Nov 15, 2024
  • 3 min read

Updated: Nov 22, 2024


Cyberattacks are on the rise, and data breaches are becoming more frequent. One of the most common ways hackers gain access to sensitive information is through weak or compromised passwords. It's time to take control of your passwords. In this blog post, we'll explore the latest threats, discuss effective password management strategies, and provide practical advice to help you, and your business stay safe in the digital world.



STRONG PASSWORDS.


Length: The longer your password, the harder it is for attackers to guess or crack it. Aim for at least 20 characters but longer is always better.


Example: With modern technology, a short password like “abc123” can be cracked almost instantly, while a 20-character password like “Th1sIsMuchM0r3S3kuure” is much more secure.


Complexity: Mixing uppercase and lowercase letters, numbers, special characters, and intentionally misspelling a word or two increases the difficulty for attackers using brute force or dictionary attacks.


Example: Compare “donutsaredelicious123” to “D0hnut$@rEd3l!shiou$123!%”. The latter is significantly harder to guess.



USE PASSPHRASES


Definition: A passphrase consists of a series of words strung together, creating a longer and more secure password that is still easy to remember.


Example: “TheFir$tS1p0fCawffeIstHeBe$7” is strong, memorable, and significantly more secure than a simple password.


Memorability: Passphrases are easier to remember because they can form a coherent phrase or sentence.


Example: “Thef!rst$ipofCaWFFe3isbEst64” is memorable and secure.



USE UNIQUE PASSWORDS FOR EVERY ACCOUNT


Avoid Reuse: Using the same password across multiple accounts means that if one account is compromised, all of your accounts are at risk.


Example: If your social media password is compromised, it shouldn't grant access to your email or bank accounts.


Diversify: Ensure every account has a distinct password to limit the damage of a single breach.


Strategy: Use a password manager to generate and store unique passwords for each account.



IMPLEMENT (MFA)



Additional Layer: MFA requires a second form of verification in addition to your password, such as a code sent to your phone or biometric verification.


Example: Even if an attacker has your password, they can’t log in without the second factor.


Types: Options include text message codes, authenticator apps, hardware tokens, and biometric verification.


Example: Google/MS Authenticator, Authy, and YubiKey are popular MFA tools.



ROTATE YOUR PASSWORDS


Frequency: While it isn't necessary, some people like to regularly update their passwords. It's not a bad idea if you don't regularly check if your email was found in a breach.


Best Practices: Change your passwords about every 6 months, or immediately if you suspect a breach.


Avoid Predictability: Don’t just change a single character or digit; create a completely new, strong password each time.


Example: Don’t change “Password1” to “Password2”—use “N3w$tr0ngPa$swherd!”



USE A PASSWORD MANAGER



Convenience: Password managers help generate and store all your passwords in an encrypted vault, allowing you to access them with a single master password.


Example: No more writing down passwords or trying to remember complex combinations.


Security: They generate and store strong, unique passwords for each of your accounts.


Examples: LastPass, Password1, and Bitwarden are popular password managers.



EDUCATE YOUR EMPLOYEES


Training: Regularly train employees on cybersecurity best practices and the importance of strong passwords.


Example: Conduct workshops or provide online training modules.


Policies: Implement and enforce strong password policies company wide.


Example: Require employees to use unique, complex passwords and MFA for all business accounts.


Enforce: Make sure you have a technological way to enforce the password policies, or they become just a "wish."



CHANGE DEFAULT PASSWORDS


Change Defaults: Default passwords are widely known and easily guessed. Always change them immediately after setup.


Example: “admin” and “password” are common default credentials that should be changed.


Security Risks: Default passwords can be found in online databases, making devices vulnerable to attacks.


Best Practices: Customize passwords for all new devices and applications.



MONITOR FOR BREACHES\



Alerts: Use services that monitor the web for data breaches and alert you if your credentials are compromised.


Examples: "Have I Been Pwned," and password managers often provide breach monitoring.


Action: Immediately change your passwords if a breach is detected.


Example: If you receive a breach alert, update the compromised password and enable MFA if not already in use.



SECURE STORAGE


Physical Security: Avoid writing down passwords or storing them in unencrypted files or easily accessible locations.


Best Practices: Store physical copies in a safe or lockbox.


Digital Security: Use encrypted storage solutions for digital password storage.


Examples: Password managers and encrypted digital vaults are good practices.

 
 
bottom of page