Uncategorized

Passwords and Authentication: The Keys to Cybersecurity

authentication | cybersecurity | passwords
A digital shield with a keyhole symbol, representing cybersecurity and secure authentication, set against a futuristic hexagonal and binary pattern.

Why is it important to safely store your passwords?

According to data from Dashlane, most people have over 200 accounts that require passwords. The more accounts, more apps, and more passwords you have, the more opportunities for hackers to steal your identity. Cyber security threats are at an all time high, as data breaches are becoming larger and more frequent. 

When your password is part of a breach, hackers will try it on different sites/apps/services in attempts to unlock more of your accounts; this is known as a “stuffing” attack. “Phishing” is another tactic used by hackers where they try to trick you into revealing your login credentials. This is why it is essential to create strong passwords and store them in safe ways in order to avoid the various techniques used by hackers. Failing to do so can result in: 

Identity theft

A hacker who gets into a main account of yours can access highly personal information such as your social security number, full name, credit card information, address, and more. They can then use this information to completely steal your identity by opening accounts in your name, impersonating you, and creating a hassle that may take months to fix.

Financial loss

Although there are federal protections against unauthorized transactions, if a cybercriminal gets your bank password, they will be able to hack into your bank account and steal money before you even realize there is a problem.

Account takeover

If a hacker gets into one or more of your social media or email accounts, they can gain control by messaging your family, friends and colleagues in attempts to steal their money and personal information.

Most unsecure ways to store your passwords

As we know, failing to keep track of your passwords in a safe way can have extremely harmful consequences. Here are some of the worst ways to store your login information:

Email

You should never email yourself a password or login information as a way of keeping track. This is due to the fact that emails are able to be stored on different servers and kept in trash folders after being deleted, making them easily accessible to hackers.

Notes app on your phone

If your phone is not protected with an unidentifiable passcode, anyone who picks up your phone can gain access to the login information stored in your notes. You are now able to lock your notes with a password, but even then you run into the issue of storing that password.

Document on your computer

People often create Word documents or spreadsheets on their computer with a list of their passwords. Even if you have a password to protect these files, a hacker utilizing a keystroke logger can gain access to your passwords. A keylogger, or keystroke logger, records the keys you strike and what you type on your device. It is a type of malicious software that can be installed to your device without your consent. 

Paper note

Keeping a physical, tangible copy of your passwords may seem like a safe option to protect your information from internet hackers around the world. It is important to consider that anyone who enters your house could potentially find these records: service people, house cleaners, burglars, even relatives and roommates.

How to safely store your passwords

Now that we have discussed the most unsafe ways to keep track of your passwords, here is a guide on password security best practices you can take to protect your information and obtain the highest level of online security.

Do not reuse passwords

If you take only one tip from this article, let it be this: stop reusing your easy-to-remember, recycled passwords and start fresh. Reusing passwords across multiple or all accounts highly compromises the security of your online accounts.

For example, if you use the same password for Netflix and your bank account, a data breach at Netflix could allow hackers to easily access your bank account. An article from The Washington Post contains insights from a penetration tester who worked to help companies find paths that hackers could use to gain data. It was revealed that this individual was able to access 20,000 corporate accounts in less than one hour by plugging in the default passwords the accounts came with. 

Avoid these passwords

According to Cybernews, these are the top 5 most common passwords in 2024:

  • 123456
  • 123456789
  • qwerty 
  • password 
  • 12345

Additionally, avoid these common passwords that can easily be guessed upon hackers conducting an easy social media search on you:

  • Pets’ names
  • Kids’ names
  • Favorite teams (there are so many professional sports teams)
  • Birthdays

It is okay to use these things as part of your passwords, but to be safe you must make them more unique. We recommend adding additional letters, numbers and symbols.

Make your passwords impossible to guess

As mentioned before, guessing your birthday or child/pet’s name only requires a quick visit to Facebook or Instagram. Microsoft conducted a survey that revealed 15% of people use pets’ names for their passwords, and Tessian found that 21% of individuals use easily guessable passwords such as their birthdays or favorite sports teams.

A best practice is to make your passwords long, as in more than 12 characters. They should also contain a strong password combination of numbers, letters and special symbols. According to Microsoft, 96% of password-related cyber attacks involve passwords containing less than 10 characters. 

Check if your passwords have been exposed

If you have an iPhone, it is important to be aware that Apple notifies you if one or more of your passwords have been leaked in a data breach. On your iPhone, go to Settings → Passwords → Security Recommendations. From here, it will show you a list of accounts associated with leaked passwords that are putting your security at risk.

For those passwords you have saved on Google, go to passwords.google.com → Go to Password Checkup → Check Passwords. There is also a website called Have I Been Pwned that allows you to type in your email address and see how many data breaches have exposed your information.

Use a password manager

There are two main forms of credential managers:

Browser password managers

These are more commonly known, as your browser likely offers this feature. Popular browsers such as Chrome, Safari and Firefox offer password management. This feature allows you to save passwords upon setting up a new account, generate strong passwords, and automatically sign in to your accounts. 

Password manager applications

Password manager applications are a good alternative to browser password managers, as a reputable login manager app is one of the most secure ways to store your information. The only thing about this way of management is that it can be timely as well as pricey. It may take a while to find the best plan for you, but one of the most highly recommended login manager apps is Dashlane.

Set up two-factor authentication

More and more companies, sites and apps are now offering the option to turn on two-factor authentication. 2FA (2-factor authentication) uses a second login credential on top of a password, usually a code sent through an app or text message. Growth Power Suite (GPS) provides this form of authentication to keep your information in top-notch security. Learn all about username and password authentication below.

Authentication factors

To prevent hackers and unauthorized users from getting into your accounts, most sites require you to log in with a username and password. This process that verifies your identity is known as authentication. The credential you provide, such as your password, is an authentication factor. Authentication factors can be broken up into three categories:

  1. Something you know– a password, pin number, answer to a security question, etc.
  2. Something you have– a security key or a one-time verification code you receive through text, email or an authenticator app
  3. Something you are– your facial ID, fingerprint, retina, etc.; this is known as biometric authentication

To access accounts with two-factor authentication, you are required to provide credentials from two out of the three categories above. This is known as multi-factor authentication.

Common methods of authentication

As mentioned previously, two-factor authentication is becoming increasingly popular, as it adds an additional layer of security for the passwords you create. There are other forms of authentication that only give you one option, or let you choose which method to use. Here are the most common authentication methods:

One-time passcode via email or text message

GPS offers this type of authentication, which first requires you to enter your username and password. Then, it allows you to choose whether you want to receive your six-digit verification code through either text message or email. This code is sent instantly, but it expires and is only good for one login. Once you enter your code, you are in!

Security key

A security key is a physical device that comes in different shapes and sizes, acting as your second authentication factor. First, as always, you must enter your username and password. Next, use your security key. Some plug into a USB port, while others use near-field communication to connect to your device when you hold it closeby. Your employer may provide this, or you may buy one for your own personal use.

Authenticator app

Some accounts utilize an authenticator app, such as DuoMicrosoft Authenticator, or Google Authenticator to verify your identity. Upon entering your username and password, your authenticator app of choice will either provide you with a verification code to enter or a push notification.

A push notification requires your approval and is sent anytime someone tries to log in to your account. The notification usually provides information about the login attempt, such as the date, time and geographic location of the device being used. You can approve or deny the login request with a simple click on your authenticator app, adding a layer of security. 

Wrapping Up

Creating and storing passwords in a safe, secure and effective manner is often overlooked. Cybersecurity is a growing threat in our increasingly digital world, so it is extremely important to be weary and follow the best practices discussed in this article.

When researching the features of business software be sure to include 2FA security in your decision.  Choosing an all-in-one business solutions software like Growth Power Suite (GPS) that offers 2FA will help protect your data

References

  1. Federal Trade Commission Consumer Advice, Use Two-factor Authentication to Protect Your Accounts, (FTC, 2022)
  2. Tatum Hunter, The ultimate guide to managing your passwords, (Washington Post, 2023)
  3. Allie Johnson, How to securely store passwords- tips for managing and storing passwords, (Norton, 2021)
  4. Paulius Masiliauskas, Most common passwords: latest 2024 statistics, (Cybernews, 2023)
  5. Clare Stouffer, What is a keylogger? A total protection guide, (Norton, 2023)
  6. Dashlane, 8 of the Most Common Ways Hackers Steal Passwords, (Dashlane, 2023)

Map Your Route to Success:
Turn Connections into Growth

Every great achievement starts with a decision to try. Your move toward business improvement begins here. See how Growth Power Suite can give your business the boost it needs, guiding you towards new accomplishments. Don't just imagine success - create it with our support. Are you set to start your growth journey?

Other Posts to Review