Are your passwords secure?


We all have them and use them everyday. Passwords are a necessary part of computing. Their purpose is to ensure your privacy, protecting access to your personal data. However in the world we live in now a password that was fine years ago, is not fine now.


Because of current processing power in computers and password crackers/rippers (software to discover passwords) that are available it is easy for others to obtain simple passwords based on dictionary words. In minutes, a password such as charlie can easily be “cracked” or discovered. Therefore it is not good practice to use passwords that are dictionary words. Neither are numerical passwords safe.


A secure password should be at least 8 characters long and contain 3 of 4 different character types Capital Letters Lowercase Letters Symbols Numbers Also a good password should be so easy for you to remember that you don’t have to write it down. This is possible by basing your password on a mnemonic phrase that you can remember.

“I like to drink coffe in the morning” can become a password by taking the first letter of each word. Doing so it will now look like this “iltdcitm” The next step will be to incorporate different character types in the phrase. An I can easily become a 1 and another letter can be capitalized. This will now leave you with “1ltdc1tM” To remember you password all you do is remember the phrase and your way of turning certain letters into numbers, along with where you like placing capital letters.


If you find that you have insecure passwords change them as soon as you can, and use the guidelines discussed above in creating new passwords. The old adage is true, “a chain is only as strong as its weakest link” therefore a computer with the latest security software but a weak password is not very secure at all. If you have any questions or comments please feel free to contact Protech.

Share Button

One Response so far.

  1. […] and make sure it is secure.  See the link below for steps on how to create a secure password. 2. Setup what is referred to as two step verification – this will involve using your […]