Password Encryption and Security: Best Practices

Password Encryption and Security: Best Practices image encryption and password security resized 600Password Encryption and Security: Best PracticesPassword security is easy, right? These days, programs and sites make you choose a complex password with at least one number, one symbol, one capitalized letter, etc. Besides, sites and programs encrypt all of that information. Right?

Wrong.

Unfortunately, it’s not that easy. Sites and web applications often give their users a false sense of security with their complicated password requirements and SSL encryption claims. In reality, complex password requirements may make it easier for a hacker to guess your password, as it provides them with a strategy for guessing a password based on a site or program’s password requirements and limitations. And encryption offers limited protection—hackers can analyze the encrypted password “hash” from a collected database and effectively reverse passwords from it.

Your business can’t afford the consequences of a data breach. Rather than relying upon the password requirements or encryption of a site or application, your best bet for password security is to create strong passwords and back them with a second layer of security.

Here are some tips for creating strong passwords:

  • Never, ever use the word “Password”, the number sequence “123,” or the name of the program or app in your password. These are very commonly used and, therefore, easy for hackers to guess.
  • Always change the default password that came with a program, device, or site.
  • Change your passwords at least every three months.
  • Get creative. Think of a password that even your best friend or spouse would never come close to guessing.

Beyond Strong Passwords

Creating strong passwords is an absolute must when protecting yourself and your network. But it’s important be aware that even the strongest of passwords provides only one layer of security—a layer that, historically, advanced hackers have been able to penetrate again and again. Using only passwords for authentication (single-factor authentication) can involve great risk, especially for businesses and organizations. After all, it only takes one employee’s compromised password to jeopardize your entire system.

For these reasons, I recommend that all of business clients (and anyone very concerned about sensitive data, etc.) consider multi-factor authentication software.

What is multi-factor authentication? Multi-factor authentication (MFA) requires users to present two or more of the three common authentication “factors” in order to gain access to a system: something you know (like a password), something you have (like a token or mobile device), and something you are (like a fingerprint or iris scan).

MFA is growing in popularity and will likely be commonplace in the near future. Cost-effective soft tokens and convenient mobile applications have made MFA systems much more accessible to everyday users and businesses of all sizes.

Consistently using password security best practices ensures that you’re strengthening your passwords to protect yourself and your business from a potentially disastrous security breach or phishing attack. But, only switching to a multi-factor authentication system will truly make your system impenetrable to outside attackers.

Learn more about multi-factor authentication in our free download, “12 Questions You Need to Ask Your Multi-Factor Authentication Vendor.”

More Tech articles from Business 2 Community:

Editor’s note:Yahoo Philippines encourages responsible comments that add dimension to the discussion. No bashing or hate speech, please. You can express your opinion without slamming others or making derogatory remarks.

  • Island Hopping in Honda Bay Gael Hilotin - Pinay Solo Backpacker
    Island Hopping in Honda Bay

    Puerto Princesa has long been a magnet of sun-worshippers and pleasure seekers. Gratefully, despite the crowd it brings, it has managed to preserve its splendor over the years. Resting on the eastern coast of the green city is Honday Bay, … Continue reading → …

  • Rising number of trafficked fishermen alarms Tawi-Tawi authorities VERA Files - The Inbox
    Rising number of trafficked fishermen alarms Tawi-Tawi authorities

    By Jake Soriano, VERA Files Bongao, Tawi-Tawi—Tawi-Tawi authorities are alarmed at the growing number of fishermen from the Visayas who end up here after being recruited by human trafficking syndicates to engage in dangerous compressor diving. The latest case involves … Continue reading → …

  • The return of Gigi Reyes Ellen Tordesillas, Contributor - The Inbox
    The return of Gigi Reyes

    By Ellen T.Tordesillas This is going to be fascinating. Atty. Gigi Reyes, former chief of staff of Sen. Juan Ponce-Enrile who is included among those accused of plunder in connection with the misuse of Priority Development Assistance Fund, came back … Continue reading → …

POLL
Loading...
Poll Choice Options