What is the best way to choose your passwords?

Cyber security expert Kevin Mitnick explains how to prevent hacking easily

(Translated from Spanish using Google Translator)

Passwords are the last line of defense between your personal information and any hacker. That is why general consensus indicates that you have a different key for each site, and that each is long and difficult to remember. However, this may complicate your existence, so cyber security expert Kevin Mitnick explained  a better solution.

Instead of choosing a very difficult password for each site, you simply need a password manager. These services allow you to host your keys in safe places, or better yet, to create random keys whenever you need them. Mitnick recommended Last Password and 1Password, managers who have hosting service, and KeyPass and Password Safe if you need a free service.

The interesting thing is that these managers will create passwords with random characters for each service you use, and fill in the password field every time you need to access them. You can even choose the length and difficulty of the key. All you need to do is create and remember a master password, which allows you to access your manager of choice. The expert said that a master password must be very long (from 20 to 25 alphanumeric characters), so a phrase or song lyric works excellently.

Finally, Mitnick said combining these generated password managers with the new 2-step authentication security measure that more and more sites have available will make it very difficult for a hacker to steal your information.

Source: QORE

Topics: Speaking Engagements, two step authentication, identity theft, cyber security, cybersecurity expert, Password Safe, password security, KeyPass, Last Password, master password, 1Password, password manager, Kevin Mitnick, long password

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg