Archives - Password


Construct very strong passwords

Use the strongest, longest password or passphrase permitted. Don’t use passwords that attackers can simply guess, like your birthday or your child’s name. Attackers can use software to conduct dictionary attacks, which try common words that may be used as passwords. They also conduct brute force attacks, which are random password attempts that run until […]

Use password management automation

While it is totally possible to produce your own strong passwords – ones based on phrases for instance – it often may be more trouble than it’s worth. Many password managers, including ones built into OSes like Apple iOS, can take care of password generation, storage, organization and retrieval for you.

Use a passcode to encrypt your Android device

The Android operating system has certainly not had the same reputation for security as iOS or desktop systems. Of course, that does not imply it lacks any useful protections, though. On many devices, you can first set up a PIN and then go to Security -> Settings and enable the Encrypt Phone option. Please note […]

Make passwords longer, not more complicated

Studies have shown that overly complicated passwords — i.e., complex combinations of upper- and lower-case letters, numbers and special characters — are forgotten and require changing frequently. Instead, combine familiar words to create a longer password. Hacking software usually works by systematically figuring out each character of a password one-by-one, so the more characters you […]

Be sure to lock all your mobile devices

You lock the front door to your house, and you should do the same with your tablets and smartphones. Employ strong passwords to lock down your tablet and phone. Securing your devices keeps prying eyes out and can help protect your information in case your devices are ever lost or stolen.

Use multi-factor authentication to protect your accounts

Even some video games recently offering rewards to users who set up two-factor authentication on their accounts. Best practice is to use this extra layer of protection on any service that provides it. This way, you’ll be safe even if someone gains access to your password and username.