Saturday, January 28, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Article > Weak passwords are a global cybersecurity issue

Weak passwords are a global cybersecurity issue

Many people are still using weak passwords for their crucial accounts, including work-related ones. Those can be broken in just a few seconds.


Rusen Gobel Rusen Gobel
September 20, 2022
3 min read
Weak passwords are a global cybersecurity issue

Passwords are still the most common way of protecting online accounts, even though they are easily compromised. According to TechRepublic, approximately 70 percent of the world’s most commonly used passwords can be decoded in under a second, for example. 

Table of Contents

  • The root cause of most data breaches
  • Use strong passwords
  • Rely on a password manager
  • Whenever possible, opt for MFA
  • Don’t change passwords regularly

The root cause of most data breaches

Weak passwords threaten online users and represent a global security issue. A Keeper Security study found that weak passwords were the root cause of most data breaches, and the results can have far-reaching implications. 

For instance, a compromised password was to blame for the 2021 Colonial Pipeline hack, which led to significant East Coast fuel shortages. Meanwhile, there were troubling reports in 2022 of hackers targeting the Wolf Creek Nuclear Operating Corporation, which operates a Kansas nuclear power plant.

Given the potential for cyber warfare and the obvious inconvenience and vulnerabilities associated with passwords, one might wonder why we continue to use them at all. The answer is simple: we don’t have a better alternative yet. 

With that in mind, here we take a look at how to ensure passwords are as effective as possible and how to add additional layers of security to protect accounts. 

Use strong passwords

The strongest passwords generally have these characteristics: 

  • Longer than 12 characters
  • Unique
  • Complex
  • Hard to guess
  • Random

Because threat actors use algorithmic software to crack passwords, length is a critical factor. It takes a program far longer to crack a 14-character password than a six-character password. Uniqueness is also essential; any passwords on the most-common list (qwerty123, 123456, password, and so on) must be avoided as many password-cracking programs test these first and foremost.

Complexity is the mix of upper and lower-case letters, numerals, special characters, and punctuation. While hard to guess and random means avoiding any known words, terms, or personal information. 

Rely on a password manager

Password managers such as LastPass conveniently store your codes in an online vault, which you can access with a single master password. They also help you generate strong passwords and automatically log into sites and accounts.

While these managers aren’t immune to attacks (as witnessed by LastPass’ 2022 breach), most reliable programs follow exceptionally robust security practices. 

Whenever possible, opt for MFA

MFA provides another layer of security by requiring an additional method of authentication. For instance, a password plus email or SMS verification. Although both SMS and email verification have known issues, when combined with a strong password, MFA affords far greater security than a password alone. 

According to F5 Labs, invisible MFA (iMFA), which relies “on factors that are invisible to the user”, is one potential solution to the password problem. 

Don’t change passwords regularly

Traditional wisdom held that changing passwords regularly helped prevent attacks. But in recent years, experts have discouraged this practice, instead encouraging us to keep the same long and complex passwords long-term (unless a password is compromised).

The National Institute of Standards and Technology (NIST) updated its standards in 2017 to reflect this. And it goes without saying that each account should have a dedicated password. 

When it comes to passwords and account security, the best offense is a good defense. Follow the steps above to protect your personal and business accounts. 

Rusen Gobel

Rusen Gobel

Rusen Gobel is a news editor at Cloud7 News. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as Shiftdelete, Teknokolis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
AMDVLK GPUOpen now delivers ray tracing support

AMDVLK GPUOpen now delivers ray tracing support

Related News

Microsoft continues to invest in OpenAI

Microsoft continues to invest in OpenAI

January 25, 2023 1:45 pm
Weekly round-up 16 – 20 January

Weekly round-up: 16 – 20 January

January 21, 2023 10:00 pm
What is a colocation data center

What is colocation data center?

January 21, 2023 2:00 pm
Best 5 open-source firewalls

Best 5 open-source firewalls of 2023

January 20, 2023 5:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc5?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM and install a Linux distro on VMware Workstation

Recent News

  • Cloud7 Expert Series: Emre Baran from Cerbos
  • How to connect to the local network on a virtual machine
  • [Event] PlatformCon 2023
  • GNOME 44 Alpha is out now
  • [Event] GUADEC 2023 Conference

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.