Data Breach Defense: Strong Passwords
The single most important thing you can do to protect your accounts is to use strong, unique passwords that are not reused anywhere. Every account you have should have a unique, strong password. I discussed in the Understanding Data Breaches section how passwords can be stolen in an encrypted format from a service's database. So what makes a password "strong"?
A strong password should consist of sixteen or more characters consisting of upper and lower case letters, numbers, and special characters, and should not be reused anywhere. This, of course, means that your password is impossible to remember. Also, as mentioned in Understanding Data Breaches, weak passwords can be quickly and easily cracked through a variety of methods. The solution to this paradox is to use a password manager.
A password manager is a program or service that allows you to record login information such as username, password, login link, and other information that varies from service to service. This database is stored in such a way that makes it reasonably secure from data breaches. The advantage of this service is you only ever need to remember one password: the password to log in to your password manager, which should ideally be a passphrase.
A passphrase is a series of words rather than a single word. A good passphrase should be at least five random words. That means that quotes aren't a good idea. The good news is, if you're using a passphrase as a master for your password manager, you only need to memorize that one passphrase. And five words, even random words, are much easier to remember than a complex password. A good passphrase has the potential take upwards of hundreds of years to brute force or guess.
In today's landscape where privacy is becoming a growing concern, password managers are dime a dozen. The most important thing is to look for a service that claims to be "zero knowledge," or put another way "we can't see your passwords." A good provider will ensure that your password database is encrypted in such a way that no employee of the company can see your passwords and information. Remember: if they can see it, so can a hacker who gains access.
You should also consider whether or not cloud-based services are right for you. Cloud-based services offer incredible convenience, but you also run the risk that the provider is lying about not being able see your passwords or the risk that a hacker will download your database and then have all the time in the world to guess your master password, just like they would on any other account they steal passwords for. Using a strong master passphrase as mentioned above, this shouldn't be an issue. On the other hand, locally-stored databases run the risk of getting deleted, lost, or corrupted if you don't keep reliable backups.
Note: There are dozens of password managers, even open source ones. For the purposes of this site and to avoid having my readers drowned with too many options, I have narrowed it down two popular, credible options.
|Click here for a visual version of this chart|
|Listed in alphabetical order, not order of recommendation|
I suggest you stop what you're doing immediately and adopt secure passwords for your most critical accounts. Bank, email, and other accounts you can't afford to live without. Do it right now before you do anything else.
For the rest of your accounts, there's two main ways to go about it. The first is "all at once." Basically, clear out an afternoon when the kids are at the movies and the spouse is out with their friends and change everything all in one sitting. This isn't a bad idea, but it can be exhausting and mind-numbing. For most people, I recommend the "as you go" approach where you change passwords as you use them. For example, next time you log into Amazon, change your password. Then, next time you order pizza, change that password. In time every account will have a unique, strong password.
Tips & Tricks
Password managers typically include a note-taking section. This is a great spot to take notes like MFA backup codes, answers to security questions, or other account-specific details you want to remember.
A common strategy for added account security is to give false answers to security questions. For example, a common security question is "what is your father's middle name?" This kind of information is easy to find online. A hacker could call the bank posing as you, answer the question, and transfer all your funds out of your account. Instead of the true answer, answer with a passphrase and record it in the notes section.