Busting the Password Misconceptions


Has any of your social media or email accounts ever been hacked before?  If so, you may remember how hackers used your information to scam your friends and family.  In fact, some criminals might use your email to get access to other accounts and devices, reset their passwords, delete accounts, or even access credit information.  Scammers just want to use your accounts to benefit themselves in any possible way.

You know what?  Weak, common, reused passwords, or writing your passwords down and storing them in an unsecure way is what solds you to hackers.  The password rule of thumb is to avoid any poor passwords that attackers can easily crack. Otherwise, don’t be surprised what hackers can do with your accounts and information after password cracking.

This article highlights some password myths contributing to weak or poorly designed passwords that are putting your accounts and devices at risk.

Most Common Password Myths

Myth 1: It’s safe to use the same password on several accounts.

Some users recommend using the same password in multiple accounts to make it easy to remember.  In fact, some people create one strong password and use it on all their accounts.  They forget that they would never use the same key for their home, car, or office in real life – it’s the same with passwords.

Therefore, create different, strong passwords for each of your accounts. Don’t write them down;  instead, opt for a password manager to safely store them in digital form to eliminate the need to memorize all your passwords. This way your password practices will improve.

Myth 2: Complexity Trumps Length

There are different types of cyberattacks. Brute-force and dictionary attacks are among the most common ones. Bear in mind that your set of random characters does not generate a super-secure password.

On the other hand, creating a password using a long string of words you can easily memorize can be more secure because it’s actually stronger.  Try adding length to your passwords instead of struggling to replace letters with different symbols (#$%&^!@).  After all, you can’t make a short password complex no matter your efforts.  Therefore, prioritize both aspects to give hackers a hard time cracking your password..

Myth 3: Password Checkers Guarantees Strong Passwords and Reliability

Websites with built-in strength evaluation for the password creation process show that just adding a symbol, number, or capital letter can take your password from medium to strong.  This is contrary to how password security works.

Remember, a hacker uses sophisticated tools to break into your email or social media accounts.  These tools can instantly check every word in the dictionary.  But you can dodge the attackers by avoiding common names, dates, and numerical patterns or by creating a password without using any of their combinations.

Myth 4: You Can Use Any Password As Long As You Have Two Factor Authorization.

Nothing is perfect on this planet, and like other systems, the two-factor authentication has its flaws. In fact, some users have reported cases where hackers have gained access to their email accounts even after implementing the two-factor authentication.

You shouldn’t substitute your strong passwords with two-factor authorization.  After all, attackers have a way of going around it. The best would be if you combine those two for an extra layer of protection.

Conclusion

The best way to keep attackers away from your accounts is by maintaining password hygiene.  You can create a strong, secure password when you don’t prioritize the ease of remembering it.  After all, you have a password manager to store them securely.

Also, avoid passwords with your name or members of your family, birthdate, location, etc.  Hackers indeed know these formulas because many people use that information to make their passwords easier to remember, consequently making them more vulnerable.


Apple Gazette Team
We are a team of writers passionate about entrepreneur lifestyle and innovation. We write about topics which you are sure to find useful. This includes everything from economics and finance topics, product and technology reviews, to in-depth how-to guides and much more.

0 Comments

Your email address will not be published.