Why Are Your Password Selections So Important?

Why Are Your Password Selections So Important?

Your first line of defense against a malicious hacker is a strong password. Create or build a robust password and you go a long way toward protecting your confidential information.

Strong passwords help to prevent unauthorized users from gaining access to your information resources.

Choose a weak secret word and it can be easily defeated by a hacker.

Fight the Hacker and Cyber Crime Threat

You should know how to create complex passwords. Personal computer users and business persons alike should know how to create a strong secret word or phrase and business owners should even consider establishing a company-wide password policy. Employees and other computer users should follow through upon accepted practices. The alternative is for you to risk the consequences of losing control over your confidential and personal information resources.
Most users have the freedom to select their own password or phrase. But do you and others know how to create and maintain strong and robust passwords? Computer and network security best practices require that everyone knows how to do so.
The vulnerabilities are numerous. People are repeatedly asked for passwords when they power-up their personal computing devices and company workstations. Even Internet websites (e.g. your bank, Amazon, etc.) ask us for our unique identifiable pass code before allowing access to personal on-line accounts. We are presumably providing better security and protection for our confidential information when we are using passwords. However, if the secret word(s) you enter are weak a hacker can crack it.

How to Create and Maintain A Strong Password

• A strong password, generally, should be longer in length (between 8 and 14 characters or more) rather than shorter.
• Your passcode should be both upper and lower case alphabetic letters as well as specialized alphanumeric characters. An example of such a password would be: SaM#XXxx5%.
• A passphrase may also be used and tends to be more complex than a password and usually provides even better security. A passphrase might also be easier to remember. An example of a “passphrase” that can be easily remembered might be one that includes special characters such as: $Lillies^Grow#Tall%intheSummer$.
• Regardless of a password or passphrase’s strength, you should avoid writing it down or sharing it with others.
• Avoid using passwords or passphrases that have their origin in the popular culture.
• You should also avoid including personal information in your password (i.e. your birth date or a pet’s name).
• Passwords or passphrases should be changed frequently to remain viable and be unrelated to any previously used passwords. For example, avoid replacing one password such as “Jim’s$PassPhrase$” with a new password that is similar such as “Jim’s$NewPassPhrase$”.
• Computer users should also avoid using common words such as “vegetables” or “fruit” as passwords. Cyber criminals who are trying to gain access to your information assets can use off-the-shelf programs to conduct what is known as a “dictionary attack”. Modern day computers can literally test every word in the dictionary in an attempt to identify your password.
• Consider checking the strength or robustness of your password.


The purpose for using strong passwords or passphrases is to help assure the confidentially, integrity and availability of your private information assets. Computer users and prudent business owners and computer should educate themselves and possibly consider using consider using additional techniques to improve user authentication. To behave in any other manner is reckless.

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: