Importance of Using Strong Passwords
Importance of Using Strong Passwords
Your passwords are the most common way to prove your identity when using websites, email accounts and your computer itself (via User Accounts). The use of strong passwords is therefore essential in order to protect your security and identity. The best security in the world is useless if a malicious person has a legitimate user name and password.
The following baseline practices are quick and easy to employ, and they have a hugely positive impact on your online security.
Strong passwords:
Use strong passwords for all your social media accounts, which include uppercase letters, lowercase letters, symbols and numbers. If you want examples as to what not to use, look at the five most popular passwords from 2014.
Different passwords:
While it may be more convenient to use the same password for multiple sites, it is important that all your passwords be different. If it becomes too complicated to keep track of all of your various passwords, then consider using a password manager. This software automatically fills in your passwords whenever you log in and keeps them encrypted.
Two-step verification:
You can add an extra layer of security to your online accounts by enabling two-factor authentication, which requires you to verify your identity in another way (often utilising a phone number or a secondary email address). Since hackers don’t have access to your mobile device, this step prevents them from logging into your website’s backend or social media profiles.
Always log out:
Never leave your laptop or mobile device unattended. If you do, ensure that you log out or shut down your device and that a lock code or password is required to gain access. Be sure to log out all of your social media and email accounts, as well.
Why is this important? By using weak passwords, the list of potential concerns includes people impersonating you to commit fraud and other crimes, including accessing your bank account, buying items online with your money, impersonating you on social networking and dating sites, sending emails in your name and accessing the private information held on your computer.