Can Your Password Stand Up to A Data Breach?
Computers & Technology → Technology
- Author Miguel Ribeiro
- Published March 5, 2022
- Word count 1,316
At this point, it’s simply a matter of time before some company somewhere asks you to change your password because something somewhere down the line got hacked. In fact, in June of 2016, Fortune Magazine said, “It’s almost fashionable to become the victim of a data breach these days, or at least you’d think so, given the who’s-who list of companies announcing them.” In other words, everyone from Fortune 500 companies and hospitals to small businesses and tech giants are experiencing the rippling impact of a data breach.
Does your password stand a chance?
As an individual rudely thrown into the middle of a data breach, the first thing you should do is change your login credentials as quickly as possible. The quicker you change your credentials, the less of a chance a group of hackers has to use your preexisting password to access your account. But this will really only work if your preexisting password has made it through the initial waves of cracking and hacking.
What is hacking software?
Cyber criminals and hackers have developed a variety of software with the sole purpose of cracking your passwords. This can be done through a Brute Force attack where hackers try tens of thousands of password combinations within minutes. If the credentials are encrypted or hashed, this process can be a little more difficult.
However, as we saw with Ashley Madison in 2015, how the data is encrypted or hashed will simply determine how much longer it will take to decrypt the data or match up the hashes with the correct algorithm. As Ars Technica reported, the Ashley Madison passwords were hashed with a rather sophisticated algorithm; nonetheless, this particular hashing involved a number of programming errors, allowing 11 million of the stolen credentials to be hacked in less than 10 days. If those errors were not present, it would have taken centuries to crack as many as they did.
How else can your password be hacked?
Cracking software is not the only way an account can be unlocked. This can go down in a variety of ways, and it doesn’t always involve a massive data breach.
Phishing: You might receive a malicious email. The email will appear to come from a credible source, and it could potentially ask you to login to your account or send your information over for an “account verification.” Once you do this, the hackers will have full access to your account.
Security Questions: Just like a password, your security questions can also be hacked. People tend to answer security questions in the same way – simply due to the nature of the question itself.
For example, “What is your favorite football team?” only has a handful of legitimate answers, and people naturally want to answer it accurately to ensure they can recall it at a later time. In other words, a person isn’t going to say that his or her favorite football team is Pepperoni Pizza.
Malware: If malware has wiggled its way onto your connected device, this could also result in a leaked password. Some malware can track your every movement, and keyloggers can record every letter you type. If they’re tracking and recording at the right time, they could match up the right website with the right credentials.
What does a good password look like?
When it comes to good ol’ fashioned hacking and cracking, it’s important to have a strong password. Like mentioned earlier, your password needs to be legit enough to make it through the initial waves of hacking and cracking – giving you the time you need to get to your account and change your password. Part of this will depend on how sophisticated the hashing and encryption standards are, but the other part of this will rely on the password itself.
The longer your password is, the more difficult it will be to decipher. But, at the same time, this also means that it will be substantially more difficult for you to remember. To make this easier on you, use phrases. These are simpler to recall than a long string of random letters.
Don’t use common phrases.
Phrases are certainly better than standalone words, but that’s only if the phrase in question is unique and random. People are starting to use phrases as passwords more routinely; however, they’re also using the same phrases over and over again. And usually this consists of a phrase with the word “like” or “love” somewhere inside it. So instead of using “Ilikepeanutbutter,” use something more like “Mytummyenjoyspeanutbutter.”
Experiment with capitalizations.
Lifehacker asserts that there’s a huge difference in time when it comes to cracking a password with all lowercases versus cracking a password with all types of characters. For example, a password that does not use a word out of the dictionary, that has eight characters and all lowercases should take around 2.23 hours to hack with a basic computer. If you throw a capital letter or two in there, then that period of time should bump up to 2.21 years. Quite a bit of a difference. Now, if you did use a word out of the dictionary and you had a computer with some serious computing capabilities, this time would substantially decrease – however, a capital letter will still provide you with the solid buffer you need.
Throw in a character or number.
If a capital letter increases the strength of your password that much, consider what it does for your password if you add in a few numbers or a special character (like an exclamation point or an asterisk). However, just as it is with using common phrases, make sure you aren’t using these numbers and special characters in obvious ways. For example, just because you put “123” on the back of a word doesn’t mean this password is more secure. In fact, these combinations are attempted in hacking software automatically. But this also goes for letter replacements. For example, replacing an “E” with a “3” or an “a” with an “@”. These are obvious, and hackers will look for it. If you’re going to throw in a number or a special character, make sure it counts.
Is there another way to protect your account?
Passwords will only take you so far, especially if you’re subjected to sophisticated social engineering. These attacks rely on the human element to dupe you into dropping standard security procedures and releasing private information – like passwords. For this reason, you should consider implementing 2-factor authentication on any sites that offer it.
2-factor authentication requires two separate methods of authentication before you’re allowed to login to your account. This might consist of your password and a code given to you via a text message or email. This could even be your password plus a security question. Most major websites have adopted 2-factor authentication.
On top of 2-factor authentication, some websites (like Facebook) offer login approvals or login notifications. This means that if someone tries to login to your account from an unrecognized browser or device, you’ll be sent a notification (usually through an email). If this attempt was not made by you, then you will have the opportunity to change your password.
If you want to protect your data and online accounts, then 2-factor authentication and login notifications are a necessary step. They create an additional layer of security and provide a much-needed facelift to a system of verification that’s outdated and out of touch with modern society.
How can we help you?
If you’d like further assistance protecting and securing your online data, we can help. As an IT Provider to many local businesses, we help secure massive amounts of data every day, and we can do the same for your business. Give us a call today at 1-877-709-2656 or visit our website at www.vbsitservices.com to learn more!
For more information please contact:
Miguel Ribeiro, IT Consultant
B. 416-900-6852 | 1-877-709-2656
Instant message: https://www.vbsitservices.com
VBS IT Services
6021 Yonge St. Ste.420
Toronto, Ontario, M3M 3W2
CanadaArticle source: https://articlebiz.com
There are no posted comments.
- Recognizing and Preventing Hard Drive Failure: Safeguarding Your Data
- MPMsoft to AllMed PM: Empowering Medical Practices with Comprehensive Billing Software
- The Rewards of Owning Your Own Medical Billing Business: Empowering Flexibility, Income Potential, and Software Excellence
- Off-Site Medical Billers: The Solution for Small Practices
- Streamline Your Medical Billing Process with Advanced Medical Billing Software
- Take a Step Towards a Greener Future with LED Lighting
- Creative Fabrica, AI Text to Image Generator
- From Predictive Maintenance to Autonomous Robots: Harnessing the Power of AI and ML in Manufacturing
- Elcomsoft Phone Viewer - View, Analyze, and Export Phone Data with Ease
- 10 Essential Features Your Ecommerce Website Design Must Have
- The Role of Telemedicine in Disaster Response and Emergency Care
- BLE (Bluetooth Low Energy) and Asset Inspection Management
- Seven Realities of CRM Success and How to Address Them
- Exploring the Potential of Virtual Reality in Education: Benefits, Challenges, and Future Developments
- How We Measure Software Quality
- 100 Days of Code: The Challenge That Made Me Question My Sanity!
- The Intersection of Technology and Education: Navigating the Future Together
- Why Webflow is the Right Choice for Medium to Enterprise Level Businesses
- A Quick Guide to Get Started With WordPress.
- Custom Software Development Company
- 15 Companies That Use Salesforce CRM and How They Benefit
- Virtual Reality (VR) and Augmented Reality (AR) in Construction
- Benefits of Integrating WebChat Into Modern Web Apps
- Benefits Of Managed IT Services and Why Businesses in Irvine Should Consider Them?
- Choosing the correct mobile device for your inspection requirements
- Top Essential WordPress Plugins for Basic Website Development
- Cryptocurrency success story
- The Kosher Smartphone: Your Ultimate Guide to a Tech-Savvy Jewish Life
- Game On: The Power of Gamification in STEM Education
- Why iOS App Development Services Are Essential for Your Business