Password Security: Are You at Risk?
There's no doubt about it, security is a hard problem to solve.
The rich functionality and connectivity we enjoy in today's Internet culture does not come without a price. Admittedly, there are so many variables that affect the overall security posture of a computer, that it sometimes seems like an overwhelming task to stay ahead of the curve.
But with all the intricacies and technical dependencies that go along with securing our machines, it's still the basic steps that we need to be most concerned about doing.
The Most Exploited Weakness in Computer Security
The SANS Institute maintains a list of the top 20 security vulnerabilities being leveraged around the globe. Do you know what shows up on the list as one of the most exploited weaknesses, over and over again? Weak passwords.
That's right.
It's not buffer overflows, database weaknesses, or web server vulnerabilities, but simple, easy-to-guess passwords. It's weak passwords!
The fact remains that the majority of us as Internet users are not following good password practices. Oftentimes during a password audit I'll see the same types of passwords coming up again and again -- children's names, pet's names, phone numbers, etc. These aren't good passwords because they're associated with publicly known facts about us.
Another poor password practice is to reuse the same password on multiple systems. The problem is that if our password on one system is compromised, an attacker immediately has a probable password to try on another system.
A third poor, yet common, password practice is to keep using the same passwords indefinitely. Common sense says a password is less likely to be compromised if it is frequently changed or rotated.
With all the sophistication of today's applications, an attacker still has the greatest chance of compromising a computer by exploiting weak passwords. And until we get it right, there appears to be plenty of low hanging fruit to go around.
Minimizing Password Security Risks
Stay tuned for part two in this series, where we'll explore solid password practices you can easily implement to minimize your risk.
For more great tips like this one, be sure to download David's free security newsletter to your mailbox, today!
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.