Search
Search titles only
By:
Search titles only
By:
Menu
Forums
New posts
Search forums
Home
What's new
New posts
Log in
Register
Search
Search titles only
By:
Search titles only
By:
Menu
Install the app
Install
Reply to thread
Home
Computers & Internet
Anti-Spyware - Anti-Virus - Cyberculture
Strengthen your digital defenses on World Password
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Message
[QUOTE="Nicole Beaudoin, post: 7094"] In today’s digital world, passwords have become a necessary part of life. But even though you use them for almost everything you do online, you probably don’t give them the thought they truly deserve. May 1, 2025, is [URL='https://www.daysoftheyear.com/days/password-day/']World Password Day[/URL], a reminder that passwords are the unsung heroes of cybersecurity, the first line of defense for all your sensitive personal data. This annual event encourages you to level up your password game and strengthen your online defenses. World Password Day is more relevant than ever in today’s evolving threat landscape. Data breaches are on the rise, and according to the 2024 Verizon Data Breach Investigations Report, a staggering [URL='https://www.verizon.com/business/resources/Te3/reports/2024-dbir-data-breach-investigations-report.pdf']81% of them [/URL]are linked to weak or compromised passwords. The bottom line? If you’re still relying on “Fluffy123”, you could be putting your personal information at risk. Let’s explore password-based attacks, and some steps you can take to lock down your logins, once and for all. [HEADING=1]Threats to your passwords[/HEADING] Managing all your passwords can be a hassle. They’re easy to forget and hard to keep track of, so people tend to use and reuse simple passwords they can remember. But here’s the issue – cybercriminals are getting smarter and their attacks are only getting more sophisticated. If a scammer gains access to your personal details, they can create havoc with your finances and cause you stress for years to come. In the past, brute force attacks were the go-to method, which involved simply using trial and error to crack passwords. Today, hackers use much more complex methods – here are a few examples. [LIST] [*][B]Password phishing: [/B]In a [URL='https://www.cisco.com/site/us/en/learn/topics/security/what-is-phishing.html']phishing[/URL] attack, scammers will use emails, phone calls, or texts to pose as trusted businesses and service providers. They may send you a fake invoice to pay. They might offer you an amazing deal on an upgraded service. Sometimes they threaten to cut off a service if you don’t respond immediately. The goal is to trick you into giving up your username and password so they can access your data and steal your money. [*][B]Credential stuffing:[/B] Once hackers have your login details, they often try what’s called [URL='https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/1719167/cybersecurity-what-is-credential-stuffing/']credential stuffing[/URL] – using your stolen credentials (username and password combinations) to try and break into your other accounts. Why does this work so often? Because more than [URL='https://www.security.org/resources/online-password-strategies/']two in three people [/URL]admit they reuse passwords across multiple accounts. [*][B]Malware[/B]: [URL='https://www.webroot.com/blog/2024/10/31/nastiest-malware-2024/']Infostealer malware[/URL] can be used by hackers in the background to steal your personal information including your passwords. Once the malware is on your device it can search your web browsers, email clients, digital wallets, files, applications, etc. looking for sensitive information. They can even look for old forms you filled out with passwords, record your keyboard strokes, and take screenshots of your computer dashboard. The malware then sends this information back to hackers’ servers, sometimes within seconds. Hackers can use this type of malware for large attacks as seen by the targeted attack on [URL='https://www.wired.com/story/infostealer-malware-password-theft/']Snowflake customers[/URL]. [/LIST] [HEADING=1]Password security checklist[/HEADING] [LIST] [*] [B]Create strong passwords Longer is stronger[/B]: Aim for passwords that are at least [URL='https://www.cisa.gov/secure-our-world/require-strong-passwords']16 characters [/URL]long. Research shows this number of characters takes exponentially longer to crack. [B]Difficulty matters: “[/B]12345” may be an easy password to remember, but it isn’t going to keep the cybercriminals away. Create a unique mix of uppercase, lowercase, numbers, and symbols for each password. [B]Be unpredictable: [/B]Avoid using obvious patterns and personal details that will be easy for hackers to figure out. This means no street addresses or phone numbers, and especially no personal details you might be sharing on social media. [B][I]Did you know?[/I] [/B]More than [URL='https://www.security.org/resources/online-password-strategies/']50% of people[/URL] admit to using familiar names for their passwords, such as their kid’s name or their pet’s name. 15% said they use their own first name in their passwords! [*][B]Change reused passwords[/B] If you’re reusing the same password across accounts, it’s time for a refresh. All it takes is one compromised account for a hacker to potentially unlock dozens more. Start with your most sensitive accounts, such as banking, email, and healthcare and update those first. [B][I]Did you know?[/I] [/B]According to a study by Forbes Advisor, on average, people reuse the same password for at least [URL='https://www.forbes.com/advisor/business/software/american-password-habits/']four accounts[/URL]. [*][B]Use multi-factor authentication[/B] Even if a hacker obtains your password, you can still stop them in their tracks by adding a second layer of security to your login process. [URL='https://support.microsoft.com/en-us/topic/what-is-multifactor-authentication-e5e39437-121c-be60-d123-eda06bddf661']Multi-factor authentication[/URL] (MFA) includes things like one-time codes sent to your phone or scans of biometric features, such as your face or fingerprints. [B][I]Did You Know?[/I] [/B]Using MFA can stop [URL='https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/']over 99%[/URL] of account compromise attacks. [*][B]Consider using passphrases or passkeys[/B] These are two alternatives to passwords that you might want to consider. [LIST] [*]A [URL='https://www.pcmag.com/articles/forget-passwords-use-passphrases-for-extra-security']passphrase[/URL] is a string of unrelated words that’s easy to recall and tough to crack. For example, something nonsensical like “FancyGoldEmuDancing “ will be hard for a hacker to guess, but it might be easier for you to memorize than a string of numbers and symbols. [*]A [URL='https://www.mastercard.com/news/perspectives/2024/what-is-a-passkey-here-s-everything-you-need-to-know/']passkey[/URL] is an authentication method that uses biometric data, like facial recognition or a fingerprint. It can also use a swipe pattern (a three-by-three grid of dots) or a PIN. A passkey is used across all your devices, creating a password-free login. [B][I]Did you know?[/I][/B] Not only does signing in with a passkey make your data much more secure, it’s also [URL='https://www.biometricupdate.com/202412/passkeys-build-momentum-enabling-access-to-15-billion-online-accounts#:~:text=Microsoft%20says%20its,flow%20complete%20it.']three times faster[/URL] than using a conventional password. [/LIST] [*][B]Use a password manager[/B] Password managers are tools that make your life easier by doing the hard work for you. By automatically generating and storing your strong passwords, they reduce the risk of recycled or forgotten logins and provide secure access across all your devices. [URL='https://www.webroot.com/us/en/home/products/essentials'][B]Webroot solutions[/B][/URL] include password managers and much more, including features like real-time phishing detection to prevent credential theft. [B][I]Did you know?[/I] [/B]Users who rely on password managers [URL='https://www.security.org/digital-safety/password-manager-annual-report/']are less likely[/URL] to experience identity theft or credential theft than those who don’t. [*][B]Protect your devices [/B] Antivirus software scans detect and defend against any virus or malicious program like malware, trojans, adware and more that might cause damage to your devices. [URL='https://www.webroot.com/us/en/home/products/compare']Webroot products[/URL] offer robust antivirus protection that continuously scours the internet to identify and block the latest threats. [B][I]Did you know? [/I][/B]Hackers are moving away from browser-based attacks and embedding malicious software into everyday files like documents, installers and media. [URL='https://www.opentext.com/en/media/report/2025-opentext-cybersecurity-threat-report-en.pdf']More than 50%[/URL] of all consumer malware now enters through downloads and desktop. [/LIST] Never forget that your passwords are the very foundation of your digital defense strategy. With cyberattacks becoming more and more sophisticated, creating strong passwords is no longer optional – it’s essential. This World Password Day, take the time to check in on your password practices. Update those old logins, enable MFA, and let [URL='https://www.webroot.com/us/en/home/products/premium']Webroot[/URL] do the heavy lifting. Just a few simple steps today can save you a world of trouble tomorrow. [B]Looking for more information and solutions[/B]? [LIST] [*][URL='https://www.webroot.com/blog/2025/02/05/passkeys-the-future-of-secure-and-seamless-authentication/']Passkeys – the key to seamless authentication[/URL] [*][URL='https://www.webroot.com/blog/2025/02/21/digital-life-protection-how-webroot-keeps-you-safe-in-a-constantly-changing-world/']Protecting your digital life[/URL] [*][URL='https://owasp.org/www-community/attacks/Credential_stuffing']Anatomy of a credential-stuffing attack[/URL] [*][URL='https://adminit.ucdavis.edu/tech-tips/what-password-reuse-and-why-it-security-problem']Dangers of password reuse[/URL] [*][URL='https://www.weforum.org/stories/2024/07/popular-passwords-cybercrime-digital-safety/']Picking safe passwords[/URL] [*][URL='https://www.webroot.com/blog/2024/10/31/nastiest-malware-2024/']Nastiest malware 2024[/URL] [/LIST] The post [URL='https://www.webroot.com/blog/2025/04/30/strengthen-your-digital-defenses-on-world-password-day/']Strengthen your digital defenses on World Password Day[/URL] appeared first on [URL='https://www.webroot.com/blog']Webroot Blog[/URL]. [/QUOTE]
Insert quotes…
Verification
Post reply
Home
Computers & Internet
Anti-Spyware - Anti-Virus - Cyberculture
Strengthen your digital defenses on World Password
Top
Bottom
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…