The Importance of Password Security

By
June Adams
May 10, 2021
Share on:

Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can cause risk since much of those details can be discovered by a simple examination of social media.

Creating strong passwords offers greater security for minimal effort. Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can
cause risk since much of those details can be discovered by a simple examination of social media.

Under Lock and Key
You can buy a small padlock for less than a dollar—but you should not count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to “lock up” their most valuable assets, including money and confidential information. Fortunately, everyone can learn how to make and manage stronger passwords. It is an easy way to strengthen security both at work and at home.

What Makes a Password ‘Strong’?
Let’s say you need to create a new password that’s at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first
letter, add a digit, and end with an exclamation point. The result: Strawberry1!

Unfortunately, hackers have sophisticated password-breaking tools that can easily defeat passwords based on dictionary words (like “strawberry”) and common patterns, such as capitalizing the first letter.
Increasing a password’s complexity, randomness, and length can make it more resistant to hackers’ tools. For example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries. You can learn more about creating strong passwords in your organization’s security awareness training. Your organization may also have guidelines or a password policy in place.

Why Uniqueness Matters
Many people reuse passwords across multiple accounts, and attackers take advantage of this risky behavior. If an attacker obtains one password—even a strong one—they can often use it to access other valuable accounts.

Here is a real-life example: Ten years ago, Alice joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.

Alice did not realize the gardening forum had been hacked, and that users’ login credentials had been
leaked online. An attacker probably tried reusing Alice’s leaked password on popular sites—and
eventually got lucky.

Guarding Your Passwords & PINS. Passwords and PINS protect sensitive data and it's critical to keep them safe. Try these best practices to stay protected.

1. Do not write them down – Many make the mistake of writing passwords on post-it notes and
leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, do
not store your login information in a file on your computer, even if you encrypt that file.
2. Do not share passwords – You cannot be sure someone else will keep your credentials safe. At
work, you could be held responsible for anything that happens when someone is logged in as you.
3. Do not save login details in your browser – Some browsers store this information in unsafe
ways, and another person could access your accounts if they get your device.
4. Use a password manager – These tools can securely store and manage your passwords and
generate strong new passwords. Some can also alert you if a password may have been
compromised.
5. Never reuse passwords – Create a unique, strong password for each account or device. This
way, a single hacked account does not endanger other accounts.
6. Create complex, long passwords – Passwords based on dictionary words, pets’ names, or other
personal information can be guessed by attackers.

 

 

 

You may also like:

By
David McDonough
May 31, 2019

It’s graduation season, and there’s an excitement in the air about starting a new chapter. Mixed in with this excitement is an element of stress to make the right decisions: decisions on how things should be done, when they should be done and where they should be done. All these decisions are common, but they often distract from the purpose of what comes after high school.

We need to remember that higher education has a purpose. It’s more than an experience. The purpose of a college degree is employment. It is an investment, and as with any other investment, you should be calculating the return on that investment.  Spending $100,000 for a degree that secures a job with an annual salary of $40,000 is not the best rate of return.

There are plenty of creative ways to get a great college education without breaking the bank. Parents can start a 529 plan, the earlier the better, to help cover costs. Students can begin their higher education at a community college or secure college credit via Advance Placement (AP) exams. Additionally, students need to be sure that the field they are spending their time and energy on is going to reciprocate by providing solid career opportunities.

Making the wrong decision is not simply an unwise financial move. It can have lasting implications. Recent figures show that outstanding student loan debt has reached $1.5 trillion[i]. Our younger generation is not only struggling under this debt, they are also pushing off other personal and financial milestones, such as purchasing a house[ii], getting married or starting a family[iii]. These decisions can have long-lasting and far-reaching consequences.

Lastly, let’s not forget the countless parents who put their path to financial independence on hold to financially assist their struggling children. While wanting to financially help your loved ones is admirable, it helps no one to offer assistance at the expense of your own security. Just like when traveling by airplane, you need to put your own oxygen mask on and secure your safety first before aiding others. There are no scholarships for retirement, and you won’t have a financial safety net for the future if you don’t work towards creating it now.

College is truly an exciting time. Our young adults are learning who they are, where they want to go and how they intend to get there. At the same time, we cannot forget that college is a fleeting moment, one that is meant to arm the student with the tools needed to create a brighter and more successful future. Be sure to chat with your students to ensure that this experience does just that, rather than straddle these students with debt and stress.

[i] https://www.marketwatch.com/story/student-debt-just-hit-15-trillion-2018-05-08

[ii] https://www.businessinsider.com/student-debt-preventing-the-us-from-having-normal-housing-market-2019-5

[iii] https://www.bankrate.com/loans/student-loans/student-loans-survey-february-2019/

The opinions voiced in this material are for general information only and are not intended to provide specific advice or recommendations for any individual.

Prior to investing in a 529 Plan investors should consider whether the investor's or designated beneficiary's home state offers any state tax or other state benefits such as financial aid, scholarship funds, and protection from creditors that are only available for investments in such state's qualified tuition program. Withdrawals used for qualified expenses are federally tax free. Tax treatment at the state level may vary. Please consult with your tax advisor before investing.

The opinions voiced in this material are for general information only and are not intended to provide specific advice or recommendations for any individual.

Prior to investing in a 529 Plan investors should consider whether the investor's or designated beneficiary's home state offers any state tax or other state benefits such as financial aid, scholarship funds, and protection from creditors that are only available for investments in such state's qualified tuition program. Withdrawals used for qualified expenses are federally tax free. Tax treatment at the state level may vary. Please consult with your tax advisor before investing.

Disclaimer:

The opinions voiced in this material are for general information only and are not intended to provide specific advice or recommendations for any individual.

Stock investing involves risk including loss of principal.

Bonds are subject to market and interest rate risk if sold prior to maturity. Bond values will decline as interest rates rise and bonds are subject to availability and change in price.

There is no guarantee that a diversified portfolio will enhance overall returns or outperform a non-diversified portfolio. Diversification does not protect against market risk.

Investing in mutual funds involves risk, including possible loss of principal.

The principal value of a target fund is not guaranteed at any time, including at the target date. The target date is the approximate date when investors plan to start withdrawing their money.

No strategy assures success or protects against loss.

By
June Adams
January 4, 2022

As scammers get more sophisticated, be sure to protect yourself and your access points, such as your smartphone.

Start by making sure your phone is encrypted. Most phones, such as iPhones, Google Pixels and post-2018 Samsung phones are encrypted by default. Should you have a different model, search online for instructions on how to encrypt your phone.

Be sure to have a secure passcode for your phone. 6-digit passcodes are better than the standard 4-digit. Face or fingerprint recognition is secure as long as you use the phone’s built-in systems rather than a third-party. Utilize your smartphones’ “find phone” feature if it has one. Your smartwatch can also be utilized to locate a misplaced phone.

As your data can be intercepted on Wi-Fi networks that are not encrypted, it’s best to disable the Connect Automatically feature on your smartphone. This usually requires the simple UNCHECKING of a box. If storing payment methods electronically on your phone, only keep debit cards. Most vendors require a PIN to be entered when debit cards are used, adding an extra layer of protection. Lastly, should you be switching to a new phone, factory-reset the old phone after the switch, regardless of who will be receiving the old phone.

Ultimately, treat your phone with the same security as you treat your wallet, if not better.

Get Started on Your Financial Life Plan Today