top of page

How Secure is Your Password?

Updated: Jul 20, 2022

Data breaches and identity theft are on the rise, and the cause is often compromised passwords. After stealing credentials, cybercriminals can use passwords to start disinformation campaigns against companies, use people’s payment information for purchases, and spy on users through Wi-Fi-connected security cameras.


The Impact of Stolen Passwords:

Insecure password practices are exploited in 81% of cyber attacks worldwide, and 61% of all attacks target businesses with less than 1,000 employees. While employee education and training can help, what’s most needed to reverse this trend is for authentication to require additional proof of identity beyond simple username and password, and to be widely deployed by all companies. Only then, will cyber criminals no longer be able to use stolen credentials to access and infect systems or steal data.


Worst passwords used:

123456;

qwerty;

qazwsx;

letmein;

admin;

abc123;

passw0rd;

(...)


How To Create Secure Passwords?

▸ A password should be 16 characters or more; our password-related research has found that 45 percent of Americans use passwords of eight characters or less, which are not as secure as longer passwords;

▸ A password should include a combination of letters, numbers, and characters;

▸ A password shouldn’t be shared with any other account;

▸ A password shouldn’t include any of the user’s personal information like their address or phone number. It’s also best not to include any information that can be accessed on social media like kids’ or pets’ names;

▸ A password shouldn’t contain any consecutive letters or numbers;

▸ A password shouldn’t be the word “password” or the same letter or number repeated;

(...)


AVG time do discover:


How do we check leaked password databases?

We use "Have I Been Pwned", a reputable service that collects information about account and password leaks.



35 views0 comments

Recent Posts

See All

Cyrillic Alphabet

Exploring the Cyrillic Alphabet: A Beginner's Guide Have you ever come across the Cyrillic alphabet and wondered what it's all about? Maybe you've seen it on Russian websites, or perhaps you've notice

MacOS | Recording a Packet Trace

A packet trace is a record of traffic traveling across the network. It’s useful for investigating complex network problems related to both correctness and performance. Once you start a packet trace on

DNS Guard

Absolutely everything is connected to the internet these days, from TV to smart light bulbs, from mobile devices to smart cars. Given those ads and ad trackers are everywhere on the Internet, a browse

Comments


bottom of page