5 Ways to Protect Yourself Against the Shocking State of Password SecurityYou don't want to get 'pwned,' as the gamers say. But you don't have a photographic memory. So, what should you do?

ByJoseph Carson

Opinions expressed by Entrepreneur contributors are their own.

Shutterstock

It can happen to any of us, and at this rate, it will: Massive collections of passwords from various online services are being posted online (the dark web, mostly) at an alarming rate. Due to a possibly related string of megabreaches, over 640 million passwords have been compromised.

Related:Twitter Locks 'Millions' of Accounts With Exposed Passwords

Katy Perry and other celebrities have seen their social media accounts hacked. Lana Del Rey, Kylie Jenner and NFL Commissioner Roger Gooddell have all fallen prey to similar, and possibly related,Twitter takeovers in the last few weeks. And, while Twitter is still trying to figure out exactly how these hacks were carried out, it's pointing the finger at megabreaches some years back at companies like LinkedIn, MySpace, Tumblr and Fling.

(In an ironic twist of public comeuppance, Facebook's Mark Zuckerberg was recently outed for using the same lame password -- dadada -- so insecure it's almost funny) on more than one social media site. His Twitter account was hacked, and he was roundly ridiculed for being so lax).

There's an obvious lesson there: Stop using -- and re-using -- the same password on multiple sites! If you're like the average user, your password probably wasn't secure to begin with. There's no reason to make things easier for cybercriminals by linking your online activities together with a shared vulnerability, which could take months or even years to come to light.

But, even delayed, cyber crime will likely occur. Indeed, a surprising percentage of people re-use passwords across multiple sites, so a stolen LinkedIn password may very well get you into a victim's Twitter, Facebook, Snapchat and Google accounts.

At that point, things can get far more serious than just a few social media hacks: TeamViewer, a remote log-in application, is blaming the megabreaches previously described for a mounting number ofuser-account takeovers. Some have resulted in criminals accessing and emptying the users' PayPal and bank accounts.

None of this is exactly news, especially to those in tech fields (Zuckerberg definitely knew better!) But it is human nature to take the easy way out, and having to remember secure passwords (a random jumble of 12 or more alphanumeric characters and symbols) is definitely the hard way, especially if you need to remember ten or more (the average person uses 28 distinct cloud services).

So, if you don't want to get "pwned," as the gamers say, but you also don't have a photographic memory, what should you do? Here are five strategies to protect your password so it can protect you.

Related:的一个最Popular Password Security Companies Was Hacked

1. Check your email address against a breach database.

There's no guarantee that you're in the clear, but sites likeLeakedSourceor Troy Hunt'shaveibeenpwned.comcan tell you if your email is among the millions recently compromised. If it is, go change all your passwords, especially the important ones, like those for email (work and personal), banking, and social media. Hunt has done somefascinating analysesof password selection patterns, in case you'd like to understand the phenomenon on a deeper level.

2.总是创建强密码。

In general, hackers are smarter, faster and more devious than the rest of us. That's why U.S. businesses spend billions of dollars each year trying to keep up with them. Your "clever" six-digit password based on your login, email address, hometown, birthdate or favorite fruit can be cracked in seconds by hackers armed with widely available brute-force crackers and password dictionaries.

Per current recommendations, you should aim for an eight-to-16 character password, comprised of a mix of upper and lowercase letters, numbers and symbols. You shouldn't use any dictionary words, common or famous names, or anything in sequence (abc, 123, qwerty). Don't use any form of personally identifiable information someone could learn about you: family and pet names, street, car make/model or plate number, birthday, etc.

3. In other words -- the more random, the better.

But, how will you remember them? That's a good question, and hopefully someday soon we will come up with something more human-friendly than passwords. In the meantime, use a trustedpassword managerapp. As a last resort, write your passwords down and hide them in a locked drawer only you can access. Whatever you do, do not store them on a sticky note on your desk, or in an unencrypted file on your computer, phone or tablet.

Here's one good trick: Think of a phrase you won't forget, choose the first letter of each word, and make sure to use some symbols and numbers. For example: "Facebook eats up 4 hours each day!" can become "Feu4h3d!"

Or pick a line from your favorite song, let's say Katy Perry's: "Like a house of cards, one blow from caving in" becomes "L@h0c1bfCi"

4. Good habits go a long way.

Finally, try to incorporate good password habits into your life alongside other routines. Pick a chore you have to do every few months and add password updates to it: replacing water filters or toothbrushes, paying taxes, trimming hedges, etc. This would be a good time to check the breach databases again.

Definitely change your password(s) any time you suspect even a chance of compromise. Don't ignore breach notifications and take immediate action as instructed. Be aware of phishing scams and be skeptical of any request for personal or financial information you receive through an email, phone call or web page. Choose to usetwo-factor authentication(2FA) wherever it is offered, even if that isn't automatic and you have to opt-in. Be sure to use 2FA with your most sensitive accounts: email, banking and password managers, for example.

Oh, and did we mention . . .Don't re-use passwords!

5. What businesses can do.

When it comes to protecting passwords and user credentials in workplace settings, the stakes are even higher. Enforcing the use of strong passwords should be central to every organization's cyber security program, because access to so many services, vendors, applications, devices, databases and industrial systems is now controlled and secured via passwords.

Privileged account credentials are a favored target of hackers and are one of the most vulnerable components in an enterprise's technology infrastructure, especially if they are not properly managed and monitored.

If hackers are able to procure even one set of semi-valuable credentials, they can worm their way throughout an entire business network, setting up malware, ransomware and APTs, to be executed at their convenience. They can even use stolen credentials from your company to access your partners', customers' or vendors' networks.

Privileged account management solutions automate, monitor, and enforce password policy adherence. Components of these solutions provide self-service widgets to help users choose strong, unique passwords. Other important features include account risk assessments, comprehensive protection of privileged credentials, endpoint device and application control and automated access monitoring and recording for audit and investigative purposes.

In sum, the current state of password use and abuse is shocking and alarming. There are a lot of reasons why we should all do a better job. Our personal and work lives, and the services and products that we use every day, are increasingly dependent on connected digital technology.

Related:Why Your Password is Hackerbait (Infographic)

Strong passwords, security awareness, and good cyber habits are among our best defenses against cybercrime. Keeping our passwords safe and strong protects our assets, our families, our communities and our workplaces. Let's all do our part.

Wavy Line
Joseph Carson

Head of Global Strategic Alliances at Thycotic

Joseph Carson is a cyber security professional with more than 20 years’ experience in enterprise security & infrastructure. Currently, Carson is the Head of Global Strategic Alliances atThycotic. He is an active member of the cyber security community and a Certified Information Systems Security Professional (CISSP).

Editor's Pick

Related Topics

Business News

An 81-Year-Old Florida CEO Just Indicted for a $250 Million Ponzi Scheme Ran a Sprawling Senior Citizen Crime Ring

Carl Ruderman is the fifth senior citizen in the Miami-Fort-Lauderdale-Palm Beach metropolitan area to face charges in connection with the scam.

Real Estate

The No. 1 Thing Wealthy People Want in Luxury Real Estate, According to a 'Selling Sunset' Agent

It might come as no surprise that affluent buyers want "to have as much as they can" — but another key factor really sways their decision.

Starting a Business

At 16, She Was a Homeless Single Mom With Serious Talent. Now, Her Business Brings in Millions.

Mimi G. Ford's online venture was earning seven figures within just three years. Today, she's excited to reach even more people.

Money & Finance

Want to Become a Millionaire? Follow Warren Buffett's 4 Rules.

企业家是不能过度指狗万官方望太多a company exit for their eventual 'win.' Do this instead.

Business News

'Awful Advice': Barbara Corcoran Slammed For 'Tone Deaf' Business Advice to Interns

The "Shark Tank" star shared tips on social media about how interns can increase their chances of getting hired full-time, but the public reaction didn't go as planned.