Cyber Security Articles & News

What is the best way to choose your passwords?

Cyber security expert Kevin Mitnick explains how to prevent hacking easily

(Translated from Spanish using Google Translator)

Passwords are the last line of defense between your personal information and any hacker. That is why general consensus indicates that you have a different key for each site, and that each is long and difficult to remember. However, this may complicate your existence, so cyber security expert Kevin Mitnick explained  a better solution.

Instead of choosing a very difficult password for each site, you simply need a password manager. These services allow you to host your keys in safe places, or better yet, to create random keys whenever you need them. Mitnick recommended Last Password and 1Password, managers who have hosting service, and KeyPass and Password Safe if you need a free service.

The interesting thing is that these managers will create passwords with random characters for each service you use, and fill in the password field every time you need to access them. You can even choose the length and difficulty of the key. All you need to do is create and remember a master password, which allows you to access your manager of choice. The expert said that a master password must be very long (from 20 to 25 alphanumeric characters), so a phrase or song lyric works excellently.

Finally, Mitnick said combining these generated password managers with the new 2-step authentication security measure that more and more sites have available will make it very difficult for a hacker to steal your information.

Source: QORE

Topics: two step authentication, hacking prevention, identity theft, cybersecurity expert, keynote speaker, Password Safe, password security, KeyPass, Last Password, master password, 1Password, password manager, Kevin Mitnick, long password

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Breach and Attack Simulation vs Red Team Pentesting

Cyberattacks have posed a significant threat to organizations across the world, creating an urgency to take the necessary measures to shore up your ne..

Read more ›

What To Expect When You Get a Vulnerability Assessment From Mitnick Security

Since threat actors are constantly developing new tools and techniques for infiltrating an organization’s defenses, effective cybersecurity can never ..

Read more ›

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›
tech-texture-bg