Password security correctly implemented
Tips and tricks for a strong password
Why is a strong password so important? Strings of numbers and letters are still high on the hit list of the most frequently used passwords because they are easy to remember. But for cybercriminals, the convenience of users is a big hit: Insecure, easily cracked passwords make their work easier and for the careless user this can have serious consequences. Why password security is so important and how to create a strong password has been summarized by the experts of Hornetsecurity and presented in the infopaper Password security correctly implemented.
How strong is my password?
In times of digitalization it is not unusual to log in to a wide variety of accounts on a daily basis. As the number of online services increases, so does the number of passwords that a user has to remember. As a result, more and more users are resorting to passwords that are easy to remember. Among the top ten most used German passwords are 123456, password, 00000 and many other passwords of this type.
But these are easy for hackers to crack nowadays. An easy password consisting of six lowercase letters can be combined to a maximum of 308,951,776 possible combinations. A brute-force tool can test these in just a few seconds until the correct character string has been decrypted.
possible combinations a brute force tool is able to try within 6 seconds to crack a password.
Create a strong password
A strong password should be 12 to 16 characters long and should not contain the pet’s name, family name, or any other personal information. It is also important that the chosen password includes special characters such as commas and hyphens. Hornetsecurity’s experts also advise you to use numbers, as well as lower and upper case letters. An example of a strong password: . s~;u+.LT`“tmP?;y. But one strong password is not enough: many users only use one password for many different user accounts. If a cybercriminal manages to guess a password, he has access not only to the email account but also to several other accounts. In the worst case, a hacker could even access the network of the company where the user works.
A different password for each account? And each password contains letters, numbers and special characters? Passwords that are really secure are hard to remember. Nevertheless, the Hornetsecurity experts strongly recommend not to rely on the classic slip of paper on the monitor to remember the complex sequences. The best way to manage passwords is using a password manager or a password vault like KeePass for a higher password security. Only a master key is required for access. But even this should consist of a combination of lower and upper case letters, digits and special characters, which have not been used elsewhere before.
All information summarized
The Infopaper about password security summarizes the recommendations of the Hornetsecurity experts. Download now and get access to tips on creating strong passwords, security issues, password vaults and a password security checklist.
More information in our blogpost
Hornetsecurity’s Cyber Security Report 2024 reveals phishing remains top email threat, accounting for 43.3% of attacks, but malicious URLs jumped from 12.5% to 30.5% YoY Analysis of more 45 billion emails reveals more than a third (36.4%) are unwanted Hanover, Germany...
The Purpose of a SandboxSandbox is a controlled and isolated environment where security professionals analyze, observe, and execute suspicious or potentially malicious software, files, or code without harming their actual systems. Think of it as a digital quarantine...
Every year we at the Security Lab here at Hornetsecurity sift through billions of emails from every year and analyze the data to provide actionable insights to cyber defenders everywhere. This article serves as your appetizer for the main course, the free report which...
Hornet News – exclusive IT Security News – 1 x per month
What's in store for you?
By registering for our Hornet News you will receive information on current topics in the field of Cloud Security. Take the opportunity to get exclusive information about e-mail security. Detailed analyses, recommendations for action as well as service information specifically geared to companies are waiting for you. Register now free of charge and without obligation and benefit from our expert knowledge.
Access to exclusive content
Get free access to exclusive content such as case studies, white papers, webinars and other interesting information as a subscriber.
News and updates
Discover the latest trends in cloud security in the form of technical articles.
Information about our services
We would be pleased to inform you about new developments in our services and show you in detail how you as a company can benefit from our services.
Visit our knowledge base
Did you like this contribution about password security? Our Knowledge Base provides you with valuable information on various topics in the field of IT security. Find out which dangers exist and how you can specifically counter the threat situations to ward off CEO fraud, ransomware, phishing and the like. In addition, you receive an overview of relevant terms in the field of information security.