Create smarter passwords

Bill Carey
Bill Carey

It is exasperating the number of passwords that enterprise and individual computer users must remember, let alone manage. It lends itself to subconscious or overt rebellion, with users using a maximum of two to three common and recurring passwords for network and website access. Under this scenario, phishers rejoice – all the way to the bank.

That said, proper and effective password management involves more than diligently creating separate passwords for the network, ATM, website and telephone-based system access. Personal information is an unacceptable choice because they are easy to guess and hack. An infinitely more acceptable – and more importantly, secure – strategy involves smarter password creation and the use of formal password management systems.

Simple password creation and management involves such practices as employing a mixture of easily remembered capital and lower-case letters, numbers and symbols, using the first letter of each first word in a favorite song (i.e., “What Goes Up Must Come Down” by Blood, Sweat and Tears = WguMCDBst), changing your passwords monthly or bi-monthly, and choosing passwords typing a line above on the keyboard, e.g., DailyDouble becomes Eq8o6E97go3.

When the sheer number of passwords becomes too overbearing, too many to remember, professional password management solutions use a variety of encryption tools to create random passwords of more than 500 characters implemented with a single keystroke or two. Some go an extra step by requiring a stored URL – even to log a user onto a website.

Effective password management need not be a foreboding exercise that keeps system managers and individual users awake at night. Despite the fact that all passwords are subject to phishing, simple-to-complex management solutions can frustrate even the most sophisticated hacker, keeping your information secure and prompting the “bad guys” to look elsewhere.

Sign up to our newsletters

More in Opinions

Spotting the "black swans" of security

Spotting the "black swans" of security

How can it be that firms can feel confident in their security technology investments and their people, yet ultimately still believe that they remain at great risk?

Me and my job: Blake Frantz, Center for Internet Security

Me and my job: Blake Frantz, Center for ...

A brief Q&A with Blake Frantz, director of benchmark development, security benchmarks division, Center for Internet Security (CIS).

BlackBerry back in the game

BlackBerry back in the game

Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.