Tag Archives: Secure passwords

Create and Store Strong Passwords

By Tracey Dowdy

By now we all understand the absolute importance of strong passwords to protect our personal data. Post-it notes get lost, hard copies kept in diaries and planners can be compromised, and smartphone memos and notes are also at risk. 

The trick is to create and remember unique passwords for all your accounts. According to LogMeIn, which makes the LastPass password manager, it’s not uncommon for users to have 85 passwords for all your accounts, from banking to streaming to social media, making it impossible for the average individual to remember them all without help. 

And although password security isn’t an iron-clad guarantee that your data will never be compromised or hacked, it certainly minimizes your risk.  These tips will help you create, manage, and store secure passwords. 

Write them down. That may seem counterintuitive, but if you have a safe, firebox, or file cabinet that can be locked, you can go old-school and write it down. Just be sure you limit the number of people who know you’ve written them down and where you store them.

Use a Password Manager. The best passwords are longer than eight characters, are hard to guess and comprised of a variety of characters, numbers and special symbols. The problem is those same features that make them hard to guess also make them hard to remember especially if you’re smart enough to use unique passwords for each account. Password managers like Dashlane, 1Password, and LastPass create secure, complex passwords and store them in an encrypted database. 

Monitor whether your passwords have been compromised. Mozilla’s Firefox MonitorHave I Been Pwned, and Google’s Password Checkup can show you which – if any – of your email addresses and passwords have been compromised in a data breach. 

Avoid using birthdays, anniversaries, and other common passwords. Passwords like password, 123456, qwerty, or your birthday, anniversary, child, spouse or pet’s name are among the most common and easily guessed. If you’re using one or any of these, stop reading and go change it now!

The bigger the better. Eight characters are generally the suggested length for secure passwords but don’t be afraid to use more. The challenge, of course, becomes trying to remember those long, complicated characters, but that’s why password managers come in handy. 

Don’t repeat your passwords. One of the biggest and most common mistakes we make, even with complex passwords, is repeating them across accounts. Don’t do it. Once they’ve guessed it for one, hackers will attempt to access other accounts leaving your data vulnerable. 

Use two-factor authentication (2FA) Along with a complex, secure password, you should also use two-step verification (2FA) for an additional layer of protection so even if hackers guess your password, there’s an additional layer of protection. When you use 2FA, once the password is entered, you’ll be sent a one-time code – usually via text – so that only you can access the account. Without entering that code, the account remains locked. 

Use an authentication app like Authy, Google Authenticator or Microsoft Authenticator instead of text messaging in 2FA. Once you’re set-up, you can choose to register your device or browser so you don’t need to keep verifying it each time you sign in.

By the way, a survey by the UK’s National Cyber Security Centre (NCSC), analyzed passwords belonging to accounts worldwide that had been breached. They also discovered that codes using names, sports teams and swear words are more popular than you might think. 

The top 10 most common passwords were:

  1. 123456
  2. 123456789
  3. qwerty
  4. password
  5. 111111
  6. 12345678
  7. abc123
  8. 1234567
  9. Password1 
  10. 12345

So, if you’re “protecting” yourself with any of those, it’s not a matter of “if” you’ll be hacked but “when.”

Tracey Dowdy is a freelance writer based just outside Washington DC. After years working for non-profits and charities, she now freelances, edits and researches on subjects ranging from family and education to history and trends in technology. Follow Tracey on Twitter.

Tips When Gifting Tech

By Tracey Dowdy

No matter how tech-savvy or tech-challenged you are, there are things to consider when gifting technology to someone else. Apple or Android? Google Smart Home devices or Amazon Alexa compatible?

There’s no need to stress, just follow these simple guidelines to avoid giving a gift the recipient can’t or won’t use. 

Find out which operating system they prefer. For example, if they’re Android phone user or PC fan, then Apple products like an Apple watch may not integrate seamlessly. Or, if they’re using a Google Nest Hub, an Amazon Alexa isn’t the best choice. Look for products that work across platforms like a Roku or Fire Stick that work with most TV’s, or select wireless earbuds or smartwatches (just not an Apple Watch) are generally compatible with any type of smartphone. If in doubt, include a gift receipt for easy exchanges. CNET has a great smart home compatibility chart to help you navigate your options. 

Consider hidden costs. Whether you’re giving a laptop or headphones, keep in mind any accessories that the recipient may have to purchase. If you’re unsure, Ask the salesperson if the device is ready to use right out of the box. For example, if you’re gifting headphones, remember many smartphones have eliminated the headphone jack, so consider whether you should include a dongle with your present. Or, if you’re gifting a laptop, should you include a case or allow them to choose their own. If they’re someone who is hard on their devices or works in a rough environment, consider whether an extended warranty or protection plan is necessary.

If you’re gifting a smartphone, it’s important to know which carrier they are or will be using to ensure the phone is compatible with their service. CNET’s Jason Cipriani suggests specifically asking which wireless carrier they use or choose an unlocked phone. These days, most smartphone makers offer an unlocked version that will work on almost all wireless carriers, across platforms, however, not every carrier feature might work, particularly Wi-Fi calling, which is tuned to specific networks.

Consider privacy concerns. With stories in the news of smart home devices being hacked, be mindful that not everyone is comfortable with this type of technology in their home. Even though it appears to be the WiFi network and password that have been hacked in these cases, many people still have reservations and would not appreciate a smart home device. 

Look at software support. Some smart devices, like phones and laptops, require the user to regularly update their software. It’s not difficult, but may be intimidating to some users. Other smart devices like speakers, Alexa, and Chromecast run their updates in the background making them a good choice for less tech savvy gift recipients. 

Tracey Dowdy is a freelance writer based just outside Washington DC. After years working for non-profits and charities, she now freelances, edits and researches on subjects ranging from family and education to history and trends in technology. Follow Tracey on Twitter.