Looking back over the last 20 years (I’m writing this in 2014), the use of systems and passwords has become an unwanted but unavoidable requirement in our daily lives. We always require to be aware of many forms and layers of online protection of our sensitive data. Some examples where we need to use passwords, passphrases, identifiable images, etc. they are banks, schools, credit cards, emails, work login, job search, kids account, entertainment, communications and more and more. In terms of number, all these requirements are increasing and in terms of complication, they are becoming more and more complicated to use and manage.
20 years ago, you only had two account passwords that you had to manage. An email and a bank account. Today I manage more than 200 security memory chips online, including for myself and my family! (Wow, typing this makes me feel safe! Really…?)
Again, 20 years ago, you could enter 6 letters or numbers and it was considered a strong password. Today, I have to use uppercase and lowercase alphabets, numbers, and special characters with strength indicators that show the strength of the password as we enter it to understand how strong and secure the password is (in case there is a cybercrime to decrypt typing passwords.) Many companies do not allow me to use parts of my name in the password. Then I have to associate my account to an image and keep the image in mind. Plus I have to answer a few security questions (typically 3-5). To add even more, from time to time I need to associate and confirm my account with a cell phone number! Then there is a separate 4 digit pin for bank ATMs etc. Even my voice mail has a 6 digit access code!
Speaking of complexity! Speaking of memorizing!
Is technology useful to protect our confidential data? Yeah! Has technology complicated the problem and pushed us a lot more to manage in terms of passwords, security, etc.? Yeah!
So how do you handle these complications? Here are some pros and cons for it.
Back
1. Use long and complex passwords.
2. Generate and use random passwords yourself.
3. Store your passwords in a secure isolated file. Write if you want. Even better is spending a few bucks to have a dedicated drive, USB, etc.
4. Use limited login attempts at all allowed institutions. It basically means that after 3 or 2 or 4 (whatever number you set) failed login attempts, your account will be automatically deactivated and you have to go in person or call to prove your ID and then recover your account. It seems annoying at first, but it’s a great tool to protect your ID in the long run.
5. Answer security questions in a non-traditional way. Example; Name of the first dog. Traditional answer: whiskey. Non-traditional answer: Ihadnodog.
6. Always keep your current backup off your computer, such as on a USB drive.
7. Many experts suggest using copy and paste instead of typing in web forms, so stick to it when you log in.
8. Have a really complex master password for any files you may be using to store and protect your sensitive information, such as passwords, security questions, etc.
9. Change your passwords often. Update your registry if you are managing it.
10. Always have a working antivirus program installed. Run the program every few days in manual mode.
11. Delete accounts you no longer need.
not to do
1. Do not use any online system to save and protect your data. Chrome or Internet Explorer may cause it to “remember” your login information. It could be a service provider tool like Norton Protection. I personally call it third party dependency and it can restrict, corrupt or disintegrate at any time. Your passwords and other information are lost without any backup in this case, and in the worst case, now everything can be available to someone else too.
2. Never use the same password for more than one login wallet.
3. Do not use easy to guess passwords like: abc123, 123ABC, 0123456789, XYZ, etc. Cybercrime computers attack across the Internet and try thousands of password combinations in a minute. They can easily guess the easy passwords and login to your account. The damage can take a long time to repair in this case!
4. Don’t use a computer to generate random passwords.
5. Do not give access to unknown applications through social networks.
6. Avoid using public computers in libraries, schools, restaurants, hotels, etc. If you have to use it, please uncheck the “remember me” option before login and clear everything after use, such as cookies, history, etc. Make sure you have permission to delete it and that you are not violating any public institution policies.
7. It is generally prohibited to share a password, so please do not share your passwords.
Creating and managing according to these guidelines will help you protect your accounts and the security of your data for a long period of time.