The Importance of Strong, Secure Passwords

The Importance of Strong, Secure Passwords

Unauthorized access is a potentially major problem for anyone who uses a computer or high-tech devices such as smartphones or tablets. The consequences for victims of these break-ins can include the loss of valuable data such as presentations, emails, and music. Victims may also have their bank account information, money, or even their identity stolen. Moreover, unauthorized users may use someone else's computer to break the law, which could put the victim in legal trouble.

A strong password provides essential protection from financial fraud and identity theft.

One of the most common ways that hackers break into computers is by guessing passwords. Simple and commonly used passwords enable intruders to easily gain access and control of a computing device.

Conversely, a password that is difficult to guess makes it prohibitively difficult for common hackers to break into a machine and will force them to look for another target. The more difficult the password, the lower the likelihood that one's computer will fall victim to an unwanted intrusion.

Information Sharing & Security Issues

Thanks to modern technology, computing devices come in many different forms, such as desktop machines, laptops, smartphones, music players, and tablets. Any one of these devices may connect with other computing devices and share information, and in many cases, they may also connect with banks to conduct financial transactions. All of these machines are potentially vulnerable to misuse by unauthorized users, and therefore, users should always protect them with passwords.

Passwords are a means by which a user proves that they are authorized to use a computing device. A single device may have multiple users, each with their own password. Passwords are not unlike a lock-and-key system, in which only the right key will enable a person to have access. The difference is that each person has a different key for the same door.

Some computing devices, such as desktop computers and laptops, also have a management-level user, or "superuser," who has the ability to control other users and modify the computing devices software, among other things. This superuser account is also known as the "root" or "administrator" account. This is important to know because while hackers will try to acquire any password they can get, they will generally try to guess the superuser password first, as it gives them the most control over a device.

Key points of Password Security

There are key points of password security that users must know in order to reduce the likelihood of a hacker cracking their password and thus gaining access to their device.

  • Most importantly, passwords must be long and complex.
  • Long and complex passwords require more effort and time for a hacker to guess.
  • Passwords should contain at least ten characters and have a combination of characters such as commas, percent signs, and parentheses, as well as upper-case and lower-case letters and numbers.
  • Users should never write down their passwords, as that makes it easier for the passwords to be stolen and used by someone else.
  • Also, never use the same password for two or more devices, as hackers who break into one machine will try to use the same password to take control of others.

Mobile Devices Security

On mobile devices, a PIN or pass code is also needed. This is like a password for a computer, but it may have a minimum of four characters or digits and be something that is not personal or easily guessed. Pass codes for devices should also be set to time out after a short period of time. Upon timing out, the code will then need to be re-entered. Ideally, the timeout should occur in no more than 20 minutes, although shorter periods between time-outs are best.

Importance of a Strong Password

One of the concerns that people often have when it comes to creating complex passwords is a fear of forgetting them, particularly when there are several to remember. Naturally, a person should try to think of something that will be easy for them to memorize. One way to do that is to turn a sentence or phrase into something that is not easily recognized by others. To do this, use the first letter of every word in the sentence, replacing certain words with numbers or symbols. For example, the word "for" may be replaced with the number 4 or the word "number" with the # symbol. With this method, a password such as "Save the number for later in the year" may read St#4LITY.

Password Security Measures

Passwords are undoubtedly essential to security, but they are not the only method that can or should be used to protect one's computers and devices. In addition to creating a good password, people should learn how to safeguard it and use it wisely. This means never sharing it and, if unable to remember it, keeping the written copy in a secure location.

Other security measures outside of passwords include only providing personal information on websites that are encrypted. An encrypted website can easily be recognized by the presence of https at the beginning of the Web address. Computer security software is also critical when it comes to securing computers, and both security software and the firmware on mobile devices should be regularly updated.

Security measures such as passwords are critical when it comes to preventing the unauthorized access of one's computer and mobile devices. In today's world, hackers and other cyber-criminals are continuously finding new ways to gain access to these devices in order to steal or exploit the information within. Careless use of passwords, however, can be as bad as leaving one's computing devices unprotected. For this reason, people should create and protect their passwords with care.

Additional Information & Resources

Click on any of the following links to learn more about the importance of using strong and safe passwords.

  • Protecting Your Personal Information with Secure Passwords: The U.S. Department of Homeland Security addresses the need for secure passwords for mobile devices, email, and more. The do's and don'ts of creating a strong password are listed down the center of the page.
  • Secure Your Mobile Device: Information on how to keep smartphones, tablets, and other mobile devices safe is provided on this UC San Diego website. Information includes creating a pass code or PIN, updates, encrypting sensitive data, and backing up data.
  • Five Essential Security Measures to Protect Your Business - No Matter its Size: PCWorld discusses five ways that businesses can ensure computer safety. Included in this list of five measures is the use of a password manager.
  • How to Create Strong Passwords: Click on this link to read why it is important to create strong computer passwords and what is needed to make them strong. The page also provides a list of things that people should not do or use when creating a password.
  • Keep Safe with Strong Passwords: The University of Texas at Austin provides this article with helpful tips on how to create strong computer passwords. An explanation is also given on how hackers steal passwords.
  • Tips on Changing and Remembering Passwords: This link provides information to people who are interested in how to change their passwords and create stronger, safer ones. Tips are also provided on how to safely remember them.
  • Personal Computer Security: The importance and types of computer security are discussed. Included in the article is information on access security, encryption, firewalls, and other ways to protect from hackers.
  • Security Tip Choosing and Protecting Passwords: The United States Computer Emergency Readiness Team (US-CERT) provides information about the need and creation of passwords. Anyone who clicks on this link can also read about ways to protect passwords once they are chosen.
  • Computer Security: Upon clicking this link, a page on computer security measures opens on the OnGuardOnline.gov website. On this page, readers are given information about how to secure their personal information from scammers, hackers, and other types of cyber-criminals.