{"id":4895,"date":"2023-01-06T20:36:54","date_gmt":"2023-01-06T20:36:54","guid":{"rendered":"https:\/\/onset-media.com\/eaglesafe\/?p=4895"},"modified":"2023-01-25T12:51:53","modified_gmt":"2023-01-25T12:51:53","slug":"password-strengthening-suggestions","status":"publish","type":"post","link":"https:\/\/onset-media.com\/eaglesafe\/blogs\/password-strengthening-suggestions\/","title":{"rendered":"<strong>Password Strengthening Suggestions<\/strong>"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4895\" class=\"elementor elementor-4895\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29dbdafa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29dbdafa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77d9db88\" data-id=\"77d9db88\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee89bcc elementor-widget elementor-widget-heading\" data-id=\"ee89bcc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.1 - 15-02-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Strong Password Suggestions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9e3c70 elementor-widget elementor-widget-text-editor\" data-id=\"d9e3c70\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.1 - 15-02-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Yes, we get what you\u2019re thinking\u2026 You already have more internet logins than you ever imagined, and you\u2019d prefer not waste any more time worrying about them. That\u2019s reasonable. But the truth is that the passwords you choose and how you maintain them have worldwide implications: stolen credentials are the most common entrance point for thieves.<\/p>\n<p>We spend a lot of time at SafeMonitor thinking about passwords because their misuse has been identified as one of the most constant contributing factors to the rise in cybercrime. Passwords, on the other hand, aren\u2019t going away anytime soon. Here are our top five ideas for creating stronger passwords and overall account security.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-507b400 elementor-widget elementor-widget-heading\" data-id=\"507b400\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Select a Password with at least 16 characters.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8360a1c elementor-widget elementor-widget-text-editor\" data-id=\"8360a1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>You\u2019d think that by now, all of the warnings on the significance of strong passwords would have sunk in. Despite this, the top three passwords SafeMonitor recovered from attacks last year were \u201cpass,\u201d \u201c123456,\u201d and \u201cpassword.\u201d Passwords that are simple for us to remember are simple for crooks to guess. This renders us open to password spraying, a brute force attack in which a cybercriminal attempts to get access to a specific site using a list of usernames and popular passwords. Once a match is found, the criminal will try the same username and password combination on as many accounts as possible.<\/p>\n<p>Furthermore, regardless of the hashing algorithm used, passwords with 16+ random letters, digits, and characters would take millennia to crack. It\u2019s a good reminder that, while we can\u2019t control how a corporation protects passwords, we can take responsibility for our own account security by using more complicated passwords.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20eb882 elementor-widget elementor-widget-heading\" data-id=\"20eb882\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Make your passwords unique across all accounts.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0284d20 elementor-widget elementor-widget-text-editor\" data-id=\"0284d20\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Given the recent expansion of digital services and the global move to remote work, most people are juggling more internet logins than ever before. Criminals utilize stolen credentials to commit fraud, assuming that if you use a password for one account, you presumably use the same password for another. Despite broad education on the subject, SafeMonitor noticed a 70% password reuse rate in our recovered breach data over the last two years, indicating that the situation isn\u2019t getting better. Because of the development of automated credential stuffing programs, fraudsters can easily test credential pairs against a variety of websites to see which more accounts they can take over, which is why password reuse is so risky.<\/p>\n<p>Use a password manager to generate and store unique passwords for your hundreds of online accounts.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfa2154 elementor-widget elementor-widget-heading\" data-id=\"bfa2154\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Do not mix business and personal accounts.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9437bb elementor-widget elementor-widget-text-editor\" data-id=\"d9437bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Sixty-four percent of Fortune 1000 employees reuse passwords across work and personal accounts. While this issue appears to be similar to the one described above, the difference here is that negligence at home puts companies at danger. If your streaming or gaming account is hijacked and you have a habit of reusing passwords (even variants of those passwords), thieves may gain access to more of your personal and professional accounts.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f817e1a elementor-widget elementor-widget-heading\" data-id=\"f817e1a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Make use of Multi-Factor Authentication.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d115232 elementor-widget elementor-widget-text-editor\" data-id=\"d115232\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>When it was initially introduced, multi-factor authentication (MFA) was marketed as a \u201cmagic bullet\u201d that would fill the gaps in password security. Requiring users to supply something they know (a password) as well as something they are (biometrics) or have (a smartphone token) is a vital layer of security that will discourage some cyber threats. Criminals, like other deterrents, have developed ways to circumvent it, but that doesn\u2019t mean you shouldn\u2019t utilize it.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6234c4 elementor-widget elementor-widget-heading\" data-id=\"e6234c4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Utilize NIST Guidelines<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6eab31a elementor-widget elementor-widget-text-editor\" data-id=\"6eab31a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The National Institute of Standards and Technology (NIST) creates recommendations for federal agencies to follow, but same guidelines are also useful for private sector firms. One of the most important components of NIST guidelines on password security is to limit the usage of passwords from past breach corpuses. This means that any password exposed in a data breach, no matter how hard, should be prohibited.<\/p>\n<p>While most directory services (including Microsoft Active Directory) provide built-in settings for enforcing many NIST guidelines, comparing passwords to an ever-changing list of exposed passwords is not out-of-the-box functionality, and comparing passwords to a static list will not satisfy NIST\u2019s guidance. New breaches occur on a regular basis, increasing your organization\u2019s risk exposure, so consider using third-party services to supplement Active Directory\u2019s capabilities in this area.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-801ec58 elementor-widget elementor-widget-heading\" data-id=\"801ec58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee5028 elementor-widget elementor-widget-text-editor\" data-id=\"7ee5028\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>With online services being compromised on a daily basis, leaked\/stolen passwords constitute a significant risk if we continue to reuse passwords. Password managers are crucial, as is continual monitoring for exposed credentials, but enterprises must also educate users on the hazards of bad password hygiene. Human conduct is the one variable that cybersecurity systems cannot address. These practices and guidelines, on the other hand, might serve as the starting stages toward developing a strong password foundation for yourself and your organization.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Strong Password Suggestions Yes, we get what you\u2019re thinking\u2026 You already have more internet logins than you ever imagined, and you\u2019d prefer not waste any more time worrying about them. That\u2019s reasonable. But the truth is that the passwords you choose and how you maintain them have worldwide implications: stolen credentials are the most common &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/onset-media.com\/eaglesafe\/blogs\/password-strengthening-suggestions\/\"> <span class=\"screen-reader-text\"><strong>Password Strengthening Suggestions<\/strong><\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5519,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":0,"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":""},"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts\/4895"}],"collection":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/comments?post=4895"}],"version-history":[{"count":5,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts\/4895\/revisions"}],"predecessor-version":[{"id":5526,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/posts\/4895\/revisions\/5526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/media\/5519"}],"wp:attachment":[{"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/media?parent=4895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/categories?post=4895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onset-media.com\/eaglesafe\/wp-json\/wp\/v2\/tags?post=4895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}