How to create the perfect hacker-proof password

by Silvia Mazzetta Date: 11-08-2020 passwords security dataleaks

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple guide to building (almost) unhackable passwords.

The first thing you need to make sure is that your password does not incur any obviousities, such as using sequential numbers or letters, birthday dates, first and last names or your pet. Passwords should be unique, unintelligible and not include personal information.
First of all, don't do things like this:

bad passwords

And when building your secure password, follow the guidelines listed below:

Length is key: This is, according to Avast, the most critical factor. No password should be shorter than 15 characters.

Use as complex a combination of characters as possible: The more you mix up letters (such as upper and lower case), numbers and symbols, the stronger and more robust the password will be and the harder it will be for a brute-force attack to crack it.

Avoid common substitutions: Password crackers are up to the usual substitutions. These days, random character placement is much more effective than common leetspeak * substitutions (* definition of leetspeak: an informal language or code used on the Internet, in which standard letters are often replaced by numbers or special characters).

Do not use keyboard paths: As with the previous tips, do not use sequential letters and numbers, nor sequential keyboard paths (such as qwerty).

Your password should never be a single word: Otherwise, it will be very easy to guess.

Use the revised sentence method: Select strange and unusual words including proper names, names of local businesses, historical figures, words in another language, or exotic animals. Make a mental picture of the concepts and incorporate random characters in between to increase the level of complexity.

Use the Bruce Schneier Method: The idea is to think of a random sentence and turn it into a password using a ruler. For example, take the first two letters of each word.

Muscle memory method: Valid only for some people, in this technique your fingers remember instead of your brain. You can use a random password generator, memorize it as phonetically as possible and type it several times on the keyboard until it is in your muscle memory.

Periodically check if your passwords are part of some massive data gap.

Opt for two-factor authentication (2FA) and multi-factor authentication (MFA) to add an extra layer of protection. This could be a code sent to your phone, biometric data such as a fingerprint or eye scan, or a physical token.

Security Keys: A security key like the YubiKey provides the most advanced protection available today. It serves as your MFA, giving you access to files only if you physically have the key. Security keys are available in USB, NFC or Bluetooth versions, and are generally the size of a USB memory stick.

Use a VPN to connect to public Wi-Fi. That way, when you log in to your accounts, no one intercepts your username and password.

Of course, never send a text message or email to anyone with your password.

When you select security questions when creating an account, choose options that are hard to predict and only you know the answer, not solutions that are easy to find on your social networks.

by Silvia Mazzetta Date: 11-08-2020 passwords security dataleaks hits : 3799  
Silvia Mazzetta

Silvia Mazzetta

Web Developer, Blogger, Creative Thinker, Social media enthusiast, Italian expat in Spain, mom of little 9 years old geek, founder of  @manoweb. A strong conceptual and creative thinker who has a keen interest in all things relate to the Internet. A technically savvy web developer, who has multiple  years of website design expertise behind her.  She turns conceptual ideas into highly creative visual digital products. 


Related Posts

Brief History of Biometric Authentication

These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your…

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had…

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to…

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet.…

The worst 50 passwords of 2019

Despite all the security flaws, data leaks or privacy risks, the vast majority of people still use things like "123456" for their password. Darlings, it's time to take security a little…

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source…

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a…

Don't become a victim of identity theft

Identity theft has always been a concern, but with more and more details of our private lives openly accessible on the Internet, it's easier than ever for cybercriminals to steal…