These Password Habits Will Keep You Safe From Data Breaches

Lou Farrell By Lou Farrell
about a 4 MIN READ 4 views
computer screen showing authentication request

Revolutionized is reader-supported. When you buy through links on our site, we may earn an affiliate commision. Learn more here.

Stolen passwords and credentials are among the most common methods hackers use to steal information. To prevent an influx of even more breaches, use these strategies to protect your accounts. Even one of these tips will reinforce your data security, with every subsequent action making defenses even stronger.

Beginner Tips

Let’s start with simple techniques that take minimal time and cybersecurity literacy to implement. 

Use Long and Varied Passwords

Many websites have required users to change their default passwords to comply with the most recent agency recommendations. However, if a platform does not have these rules in place, make passwords long and complicated, incorporating these elements:

  • Between 12-16 characters
  • Capital and lowercase letters
  • Numbers and special symbols

Don’t Use Personal Information

It could feel tempting to use a birthday or a loved one’s name as part of the password. However, this information is easily accessible to hackers from publicly viewable platforms, such as social media. This makes it straightforward for a threat actor to gain access to an account and steal sensitive data. Here are a few other pieces of information to avoid in your passwords:

  • Pet names
  • Favorite things
  • Important dates
  • Identifying numbers
  • Workplace information

This type of information, albeit in a more specific context, is often used in authenticating questions anyway. Save these responses for those fields to lower the risk of stolen passwords.

Avoid Reusing Passwords

While every website, application and shop demands a unique account, you should never reuse a password for anything. Remembering potentially hundreds of specific passwords may feel impossible, but there are numerous organization methods to store everything in a safe place. 

This is time-consuming to set up, but simple to manage once you put in the effort. It is worth it because you have reduced the power of a single password to jeopardize countless digital assets.

Experiment With Passphrases

Remembering strings of random numbers, letters and characters is a lofty expectation. Instead, cybersecurity analysts recommend using a password that contains a phrase. The best way to structure the password is to write a sentence and transform it into a usable password using the industry’s recommendations, such as incorporating special symbols. 

Try writing a personal story that only you would know, so it is even harder to guess. This makes the password more straightforward to remember, but it is equally complicated.

Example sentence: I made a cherry cake for mom’s birthday.

Example passphrase: Bakedcherry!Cake4Mom

Intermediate Strategies

If you have tried all the aforementioned methods, you can consider incorporating additional, more thorough measures.

Install a Password Manager

Many companies have created managers to organize and encrypt all your different passwords, which are locked behind several authentication measures, such as a master password or biometrics. Many of these services include additional features, such as security scans, breach notifications and password generators. If you don’t want to pay for one, many browsers have them embedded and usable for free.

Active Multifactor Authentication (MFA)

You can enable multifactor authentication on almost any platform. It requires another login method in addition to a password. They can include:

  • Fingerprint reader
  • Face ID
  • SMS or email verification with a code
  • Code from an authentication app

Do Password Scans and Updates

You can sign up for services that regularly scan your email to see if it has been part of a data breach. Many password managers also do this. If you receive a notification that your credentials have been compromised, change them immediately. 

Learn About Phishing Scams

Phishing scams have expanded in scope, with numerous variants now existing. Even artificial intelligence-based phishing scams are becoming increasingly common, requiring everyone to be skeptical of everything that lands in their inbox. They are one of the most common breach types in history, so always be cautious when opening emails, links and attachments from unknown sources.

Advanced Tactics

Every individual can continually enhance their security posture. If you are still concerned with the depth of your protective strategies, use these expert-recommended tips to become one of the smartest password protectors.

Try Authentication Without Passwords

You could also eliminate the need for passwords entirely by using passwordless strategies. Many login methods you find in MFA are usable as a first option. You can also use hardware security keys for even higher security.

Stay Up to Date on Data Breaches and News

Keep cybersecurity news in your feeds to stay informed. Cybercriminals are creative, continually developing new tactics to manipulate credentials and the individuals who own them. Stay ahead of the curve by learning about new threat types and the methods hackers use to steal information.

Segment Email Addresses

Your most important accounts deserve their own email address to keep information separated from the majority of your online presence. Online profiles that manage your health, career or finances can be delegated to another place to make it even more challenging for hackers to sneak their way in. If you’re concerned about profiles like investment accounts or health data, create unique emails for each one, but try not to create so many that you can’t juggle them all.

Familiarize Yourself With NIST Guidelines

NIST is one of the leading organizations for cybersecurity frameworks. Its experts create models for businesses and individuals, and many of its tips are applicable to home use.

The password guidelines have undergone significant changes over the years, including the removal of recommendations for frequent password changes. Research slowly revealed that this actually made accounts more susceptible to breaches, so they altered their guidelines. This illustrates the sector’s development and the opportunities for adaptation.

No More Stolen Passwords

You should never have to worry about your information being stolen, but it could happen if you don’t do something to safeguard your credentials and data. Make it a goal to implement at least one of these measures today, and a few others in the coming weeks. The more you use, the more likely you are to resist the attacks of any cybercriminal.

Revolutionized is reader-supported. When you buy through links on our site, we may earn an affiliate commision. Learn more here.

Leave A Comment About This Article


Previous ArticleHow Local Bioenergy Systems Can Keep the Lights On During Climate Disasters