{"id":5465,"date":"2021-05-20T09:00:00","date_gmt":"2021-05-20T16:00:00","guid":{"rendered":"https:\/\/www.onehub.com\/blog\/?p=5465"},"modified":"2022-06-23T10:14:18","modified_gmt":"2022-06-23T17:14:18","slug":"6-tips-to-create-strong-passwords-keep-your-accounts-secure","status":"publish","type":"post","link":"https:\/\/www.onehub.com\/blog\/2021\/05\/20\/6-tips-to-create-strong-passwords-keep-your-accounts-secure\/","title":{"rendered":"6 Tips to Create Strong Passwords &#038; Keep Your Accounts Secure"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"500\" height=\"334\" src=\"https:\/\/www.onehub.com\/blog\/wp-content\/uploads\/2021\/05\/shutterstock_1909978123.jpg\" alt=\"\" class=\"wp-image-5466\"\/><\/figure><\/div>\n\n\n\n<p>In 2014, eBay was targeted by hackers. They stole the credentials of three employees and had <a href=\"https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html\" rel=\"noreferrer noopener\" target=\"_blank\">229 days of total access<\/a> to eBay\u2019s network. They used that time to steal the personal information and passwords of 145 million users.&nbsp;<\/p>\n\n\n\n<p>Breaches like this are becoming increasingly common, so your employees must understand how to create strong passwords and keep their business accounts secure.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6 best practices to create strong passwords and keep your business accounts secure&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Create long, complex, and unique passwords&nbsp;<\/h3>\n\n\n\n<p>It\u2019s no surprise that people often create short, simple passwords; they\u2019re just easier to remember. Unfortunately, they\u2019re also a cinch to crack.&nbsp;<\/p>\n\n\n\n<p>Hackers can crack a simple and <a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\" rel=\"noreferrer noopener\" target=\"_blank\">commonly used password<\/a> such as \u201cpassword123\u201d in approximately .29 <em>milliseconds<\/em>. An account with a password like that might as well not even have one. In contrast, a long, unique, and complex password such as \u201cDOfi8!ryODoyEsNe8b\u201d would take about <a href=\"https:\/\/www.hivesystems.io\/blog\/are-your-passwords-in-the-green\" rel=\"noreferrer noopener\" target=\"_blank\">1 trillion years to crack<\/a>. No one\u2019s got that much time to spare, so your account is much safer.&nbsp;<\/p>\n\n\n\n<p>A strong password has a minimum of 16 characters and includes a mix of upper and lowercase letters, numbers, and symbols. It also has to be unique. Without the unique factor, it\u2019s entirely possible to have a terrible password that follows all of these guidelines (e.g., Iloveyou1234567!).&nbsp;<\/p>\n\n\n\n<p>If you combine a solid password with smart cybersecurity practices such as keeping your devices updated, you can rest easy knowing your accounts are about as safe as they can get.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Sentences or phrases are better than single words<\/h3>\n\n\n\n<p>It\u2019s quick and easy for single-word passwords to be compromised. Never make your password a single word, even if it&#8217;s &#8220;disenfranchisement&#8221; or something similarly long. Hackers can use dictionary attacks to crack this using software that tries all the words in a dictionary or other word list successively until it finds a match.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Don\u2019t include personal information in your passwords<\/h3>\n\n\n\n<p>The amount of personal information that\u2019s readily available on social media and other public websites is staggering. It\u2019s no trouble for a hacker to find out your full name, date of birth, partner\u2019s name, pet\u2019s name, etc. This type of information should never be used in your passwords.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Use two-factor authentication to render stolen passwords useless<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.onehub.com\/blog\/2021\/01\/22\/improve-your-companys-data-security-with-two-factor-authentication\/\" rel=\"noreferrer noopener\" target=\"_blank\">Two-factor authentication<\/a> is a method of account verification that requires a password and a second piece of information to complete your login. The second factor is often a PIN, a security code sent to a mobile device, or security questions. For more advanced 2FA, the second factor could include biometrics such as voice or facial recognition.&nbsp;<\/p>\n\n\n\n<p>Two-factor authentication provides an added level of security for your accounts, and it should be used with any business accounts that offer it. Some users find 2FA frustrating because it adds additional time to the login process; however, this extra step takes less than a handful of seconds. The reward is well worth it as 2FA seriously ups the security level of your accounts by rendering stolen passwords useless.&nbsp;<\/p>\n\n\n\n<p>Because some employees find the extra step of two-factor authentication frustrating, they may opt not to use it on their business accounts despite company policy. Onehub addresses this issue with our Advanced, Data Room, and Unlimited plans. Administrators can <a href=\"https:\/\/www.onehub.com\/security\" rel=\"noreferrer noopener\" target=\"_blank\">require two-factor authentication<\/a> across the entire account to ensure secure, stress-free cloud storage and file sharing.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Encrypt stored passwords<\/h3>\n\n\n\n<p>One drawback of having unique and complex passwords is that they\u2019re difficult to remember. If you\u2019ve created a document to track your passwords, make sure it\u2019s <a href=\"https:\/\/www.onehub.com\/blog\/2021\/05\/06\/data-encryption-learn-the-basics-to-protect-your-business-files\/\" rel=\"noreferrer noopener\" target=\"_blank\">encrypted<\/a>. Encryption makes your text unreadable to unauthorized people who don\u2019t have the decryption key.&nbsp;<\/p>\n\n\n\n<p>The type of encryption you use matters, too. For example, Onehub uses 256-bit encryption to protect data both in transit and at rest. This is the same level of encryption used by banks and the CIA. Cracking it would take approximately <a href=\"https:\/\/scrambox.com\/article\/brute-force-aes\/\" rel=\"noreferrer noopener\" target=\"_blank\">27 vigintillion years<\/a>, which is longer than our universe has even existed.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Don\u2019t use the same password for multiple accounts<\/h3>\n\n\n\n<p>You\u2019re probably tired of hearing this, but <a href=\"https:\/\/resources.yubico.com\/53ZDUYE6\/as\/q3tmql-974v8g-g8llc3\/Ponemon_2019_State_of_Password_and_Authentication_Security_Behaviors_Report.pdf\" rel=\"noreferrer noopener\" target=\"_blank\">51% of people<\/a> keep doing it, so it bears repeating \u2014 <em>do not reuse passwords<\/em>. None of your accounts, personal or professional, should ever share a password. If your password is stolen or hacked, you can minimize the damage by keeping the breach to one account.&nbsp;<\/p>\n\n\n\n<p><em>Onehub is all about security. We offer two-factor authentication, 256-bit encryption, and strong password requirements. We can keep your passwords and other business data safely encrypted and stored within your Workspace for easy access. Try us out for <\/em><a href=\"https:\/\/www.onehub.com\/\" rel=\"noreferrer noopener\" target=\"_blank\"><em>free for 14 days<\/em><\/a><em>!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2014, eBay was targeted by hackers. They stole the credentials of three employees and had 229 days of total access to eBay\u2019s network. They used that time to steal the personal information and passwords of 145 million users.&nbsp; Breaches [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":5466,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false},"categories":[195],"tags":[],"_links":{"self":[{"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/posts\/5465"}],"collection":[{"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/comments?post=5465"}],"version-history":[{"count":0,"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/posts\/5465\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/media\/5466"}],"wp:attachment":[{"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/media?parent=5465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/categories?post=5465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onehub.com\/blog\/wp-json\/wp\/v2\/tags?post=5465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}