Cyber Protection Group – Penetration Testing Company
Penetration Testing, Incident Response, PCI Assessments #cybersecurity #infosec #itsecurity
814.799.0274
  • Penetration Testing
  • Business Technology Services
  • Computer Support Services
    • Home Computer Repair
    • Business Computer Repair
    • Remote Support
  • About
  • Contact Us

    Creating a Strong Password

    May 31, 2019

    password

    Strong Password Tip and Tricks

    Strong passwords (PWs) are a critically important component to protecting an account. Within an account, a variety of personal information resides.

    In this article, several tips on creating a solid password as well as a few security tips regarding passwords will be addressed.

    To begin, in 2019, a user cannot use passwords like QWERTY, 12345678 or PASSWORD anymore. Due to the fact that cyber attacks on the rise, the accounts with simple passwords would be the first ones to be hacked.

     

    Creating a Password

    Several levels of PW strength exist. Here are a few examples of PW combinations (plus an example of each) ranked from weakest to strongest.

     

    • Letters only → “ihaveastrongpassword’
      • a-z
    • Letter and numbers → ‘ihaveastrongpassword10’
      • a-z
      • 1-10
    • Capital letters, lowercase letters and numbers → iHaveaStronGpassWorD10
      • A-Z
      • a-z
      • 1-10
    • Capital letters, lowercase letters, numbers and symbols → iHaveaStronG?passWorD10$
      • A-Z
      • a-z
      • 1-10
      • !@#$%^&*()=+/?[]\;:<>

    The difference in the first password to the final one is quite noticeable. Further, with the addition of upper and lower case letters, numbers and symbols, the chance that a hacker would be able to gain access to an account is low.

    Another important component to take notice of is what should not be included in / used as a PW.

     

    What should NOT be in your PW:

    • Any information that can easily be looked up
      • Your name, parent, or pet names
      • Birthday
      • Address (street name or city)
    • Your username for the account
    • Commonly used PWs like QWERTY
    • A previous PW of another account

    Hackers use methods like a brute force attack or dictionary attack to try and guess the PW. When there are many variants in the password and personal information is left out, this creates more work than worth for the hacker. Therefore leaving your account safe and secure.

     

    Password Generator

    To continue, if a user does not want to take the time to create a difficult password, many PW generators exist online. One example is https://strongpasswordgenerator.com/

    On this site, the user can simply click ‘generate password’ and then receive a randomly generator PW that includes uppercase and lowercase letters, numbers and symbols.

     

    Account Security Tips

    Aside from creating a secure PW, a few other tips regarding account security can be of use.

    • Never give out your password
    • Store PWs safely or use a password manager
    • Use different PWs across all accounts
    • Implement two-factor authentication (extra layer of password protection)
      • (See our article on 2FA!)

    These tips are just a few steps towards a secure account and lifestyle in general.

    Above all, creating difficult PWs may seem like an inconvenience for the user to remember, but in the big picture, keeping online accounts secure is worth it. If the user gets in the habit of differentiating PWs across accounts, and implementing these tips, account security is finally within reach. 

     

    By Taylor Ritchey

     

    Other Related Resources / Articles

    [ 1 ]   /   [ 2 ]

     

     

    Post navigation

    Two-Factor Authentication – Proactive Security
    Apple AirPods Secret Feature

    Free Sample Penetration Testing Report

    Click here to download your free penetration testing report!

    Recent Stories

    • Appalachia Technologies Acquires Cyber Protection Group February 16, 2022
    • United States Improves Critical Infrastructure Security May 19, 2021
    • Hacking Group Stops Oil Pipeline and Breaks 45% of the United States Oil Supply May 10, 2021
    • What is Penetration Testing and Why Do You Need It? May 10, 2021
    • Quick! Update Your iPhone and iPad! May 3, 2021

    Cyber Protection Group Follow 4,516 2,532

    A recognized Cyber Security firm that specializes in penetration testing, #infosec news, and helping you find vulnerabilities before the bad guys do.

    cyberprotectgrp
    cyberprotectgrp avatar; Cyber Protection Group @cyberprotectgrp ·
    14 Sep 2021 1437810036269465602

    If you are thinking about getting into Cyber Security, I will be speaking to the Women in Cybersecurity Student Chapter at the University of Windsor about this great field. Topics will include getting into the field and what to expect. I will be taking…

    Image for twitter card

    Mike Miller on LinkedIn: #cybersecurity #infosec

    If you are thinking about getting into Cyber Security, I will be speaking to the Women in Cybersecurity Student ...

    lnkd.in

    Reply on Twitter 1437810036269465602 Retweet on Twitter 1437810036269465602 1 Like on Twitter 1437810036269465602 1 Twitter 1437810036269465602
    cyberprotectgrp avatar; Cyber Protection Group @cyberprotectgrp ·
    13 Sep 2021 1437524891398512651

    Is this not the end of every Teams / Zoom meeting? Agree? #infosec #cybersecurity

    Image for twitter card

    Mike Miller on LinkedIn: #infosec #cybersecurity

    Is this not the end of every Teams / Zoom meeting? Agree? #infosec #cybersecurity...

    lnkd.in

    Reply on Twitter 1437524891398512651 Retweet on Twitter 1437524891398512651 1 Like on Twitter 1437524891398512651 0 Twitter 1437524891398512651
    cyberprotectgrp avatar; Cyber Protection Group @cyberprotectgrp ·
    7 Sep 2021 1435314214294392836

    How do you handle Kids / Dogs / Cats coming on your screen when you are in a Zoom or Teams meeting? Do you say you are sorry for them interrupting or are you confident in the fact that you have a "real life" at your #workfromhome job? I am finding that…

    Image for twitter card

    Mike Miller on LinkedIn: #workfromhome #cybersecurity #infosecjobs

    How do you handle Kids / Dogs / Cats coming on your screen when you are in a Zoom or Teams meeting? Do ...

    lnkd.in

    Reply on Twitter 1435314214294392836 Retweet on Twitter 1435314214294392836 0 Like on Twitter 1435314214294392836 1 Twitter 1435314214294392836
    Load More...

    WE'RE SOCIAL!

    Recent News
    • Appalachia Technologies Acquires Cyber Protection Group
    • United States Improves Critical Infrastructure Security
    • Hacking Group Stops Oil Pipeline and Breaks 45% of the United States Oil Supply
    • What is Penetration Testing and Why Do You Need It?
    • Quick! Update Your iPhone and iPad!
    Pages
    • Blog
    • Penetration Testing
    • Security Vulnerabilities
    • Computer Support Services
    • About
    • Contact Us
    • Application and Website Security Testing
    • Wireless Penetration Testing
    • Top Penetration Testing Company at a Low Cost
    • Home Computer Repair
    • Home
    • Business Technology Services
    • Offering Vulnerability Assessments / Penetration Testing for only $3,950
    • Remote Support
    • Sample Penetration Testing Report

    Contact Us

     
    2230 Woodbury Pike, Ste. 1
    Loysburg, PA  16659
    814.799.0274