{"id":738,"date":"2021-07-13T05:55:59","date_gmt":"2021-07-13T05:55:59","guid":{"rendered":"http:\/\/www.cyberlaws.org\/?p=738"},"modified":"2021-07-13T06:00:28","modified_gmt":"2021-07-13T06:00:28","slug":"guide-to-secure-passwords-and-logins-in-2021","status":"publish","type":"post","link":"https:\/\/www.cyberlaws.org\/guide-to-secure-passwords-and-logins-in-2021\/","title":{"rendered":"Guide to Secure Passwords and Logins in 2021"},"content":{"rendered":"

Guide to Secure Passwords and Logins in 2021<\/strong><\/h1>\n

\"\"<\/p>\n

Image from Pixabay.com\u00a0<\/em><\/p>\n

According to research done by the Ponemon Institute, people use one password for up to five accounts on average. If this password is compromised, all their accounts are at risk of hacking, leading to data loss and even financial loss. Statistics also show that\u00a0at least 60% of passwords<\/a>\u00a0used by companies do not meet the minimum-security threshold.<\/p>\n

Since the inception of the internet, password security has been one of the most discussed topics regarding online security. While it was ok to use simple passwords like your name or year of birth as your password 20 years ago, this is impossible in the modern-day where hackers lurk online waiting to pounce on weak passwords.<\/p>\n

The use of weak passwords has had catastrophic consequences for businesses and individuals, with more than 80% of data breaches occurring because of weak Password security. As more people and institutions rely on the cloud to store data, login credentials are the only line of defense for this data, hence the need for well-protected credentials.<\/p>\n

Here is how to secure your passwords in 2021.<\/p>\n

Use a Password Manager<\/strong><\/h2>\n

Most people use the same password for multiple accounts to avoid having to memorize different passwords. If this sounds like you, a password manager is the solution you need. There are numerous password managers available in the market.\u00a0With a password manager<\/a>, you do not have to memorize your password since it creates and saves unique passwords for all your accounts.<\/p>\n

The best password manager also alerts you whenever a password is compromised or too weak and needs changing. The password manager auto-fills the login details whenever you need to access an account, taking away the need to remember all your credentials.<\/p>\n

Set strong passwords<\/strong><\/h2>\n

The first line of defense against password loss is to use a strong password. The length of your password matters as it reduces the odds that a hacker would crack all the characters. Ensure it comprises letters, special characters, and numbers.<\/p>\n

Avoid reusing passwords<\/strong><\/h2>\n

Reusing passwords is one of the most common causes of multiple account hacks. Imagine having to use one key for your home, car, mailbox, office, and storage. If you lost this key, the one who finds it would have access to all these places. The same goes for passwords. If you use one password for multiple accounts, a hacker can access all these accounts if they get hold of your password.<\/p>\n

Reinforce security with 2FA<\/strong><\/h2>\n

2FA has become a requirement for password security. It provides additional protection for your accounts even after your password is hacked. With\u00a02FA<\/a>, anyone trying to access your account will need to verify their identity using a unique code sent to a mobile device. Unless a hacker has access to all your devices, their hacking attempts are rendered useless by 2FA.<\/p>\n

\n","protected":false},"excerpt":{"rendered":"

Guide to Secure Passwords and Logins in 2021 Image from Pixabay.com\u00a0 According to research done by the Ponemon Institute, people use one password for up to five… <\/p>\n","protected":false},"author":1,"featured_media":739,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":[],"categories":[151,53,171],"tags":[],"_links":{"self":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts\/738"}],"collection":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/comments?post=738"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts\/738\/revisions"}],"predecessor-version":[{"id":740,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts\/738\/revisions\/740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/media\/739"}],"wp:attachment":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/media?parent=738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/categories?post=738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/tags?post=738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}