Guest Opinion: Password security continues to be a challenge for people and businesses across the world, and in the wake of the Colonial Pipeline ransomware attack where a single password was the key to hackers breaching the entire network, businesses should assess their own password practices.
So, if you are trusting your personal security to be protected by ‘qwerty’ or ‘12345’, you are setting yourself up to be hacked.
However, even if you deploy a long and strong password with a combination of letters, numbers and special characters, your password still isn’t bulletproof. There are multiple ways cybercriminals can get hold of passwords without having to guess your dog’s name.
For example, some internet services still store plaintext passwords, whether due to bugs in their system or sloppy practices. Google and Twitter have both flagged this issue with users in recent years, and while plaintext data storage is now rare, it still occasionally happens. As a result, when hackers compromise one of these servers, they can access every user’s data with no decryption required.
Malware also plays a significant role in how hackers can steal passwords. If a server has been hacked, it could host memory-scalping malware, which can find raw passwords while they are being checked, even if the password never gets saved to the disk. Keylogging malware can also be downloaded to your device directly, which captures passwords and other sensitive data as you type them. This is why employing a strong antivirus solution is integral across personal and professional devices.
Once hackers have your password, it doesn’t matter how complex or long it is, they can access every other account that shares it. This process is known as credential stuffing. If a password works on one account, it costs a hacker almost no time or effort to try that same one on other accounts.
While using one password across all accounts will leave you vulnerable, using passwords that are obviously linked should also be avoided. If your Facebook password is ‘FBpassword123’, it isn’t a far reach that your Twitter password might be ‘TWpassword123’, making this strategy no safer from credential stuffing than using the same password for everything.
So, how can people and businesses protect their account logins effectively?
- Don’t re-use passwords. Similarly, don’t use a template for your passwords that is modified slightly for each different account. Cybercriminals are on the lookout for this and will get around it.
- Use a password manager. Password managers will generate random and unrelated passwords for each account, meaning even if one password is compromised, the rest of your accounts stay safe. Remember that you don’t have to put all your passwords into a manager app if you don’t want to: it’s okay to have a special way of dealing with your most important accounts, especially if you don’t use them often.
- Turn on 2FA if you can. While two-factor authentication doesn’t guarantee your account’s safety, it stops criminals from carrying out attacks on a broad scale, as passwords alone won’t grant access.
- Install antivirus protection on all your devices to protect yourself from malware. As well as antivirus software on your computer, you should also consider installing an antivirus app on your mobile device, such as Sophos Intercept X for Mobile. Make sure these apps are updated and run regular scans to protect your devices.
- Report payment anomalies. Track your outgoing and incoming payments for irregularities, and report any errors as soon as possible, no matter how small the amount. Report errors as soon as you see them, even if you didn’t lose any money. The sooner you report it, the sooner you can secure your account.
GRAND OPENING OF THE ITWIRE SHOP
The much awaited iTWire Shop is now open to our readers.
Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.
PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.
Products available for any country.
We hope you enjoy and find value in the much anticipated iTWire Shop.
INTRODUCING ITWIRE TV
iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.
We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.
In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.
We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.
See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.