{"id":861,"date":"2011-09-23T09:39:46","date_gmt":"2011-09-23T16:39:46","guid":{"rendered":"http:\/\/www.redwireservices.com\/?p=861"},"modified":"2014-07-25T16:27:52","modified_gmt":"2014-07-25T23:27:52","slug":"strong-passwords-made-easy-passphrases","status":"publish","type":"post","link":"https:\/\/www.redwireservices.com\/strong-passwords-made-easy-passphrases","title":{"rendered":"Strong Passwords Made Easy: Passphrases"},"content":{"rendered":"

Recently I got the following note about password security<\/em> and how to make a strong password<\/em> from Seattle Search Marketing Consultant Mark McLaren<\/a> (edited\u00a0for brevity):<\/p>\n

My clients are having more trouble with hackers these days. WordPress is susceptible to hackers on a lot of levels but the main issue is usually one of break-ins and malicious use of PHP on the host server, typically to send spam, when a bot figures out how to crack the [weak] admin password. …<\/p><\/blockquote>\n

Indeed this is a big problem these days, and it certainly is not limited to WordPress. \u00a0Just a month or so back, two of my Twitter<\/a>\u00a0followers were hacked due to weak passwords and as a result of the attack\u00a0phishing links<\/a>\u00a0were sent to all of their followers via direct message<\/a>.<\/p>\n

\"\"<\/a>

Message received from a hacked Twitter account, with a link to a phishing site<\/p><\/div>\n

If this happens to you, hopefully your followers know you well enough to notice the message was not written by you. However, if they do follow the link and infect their computer, lose money from their bank account, etc., how is that going to play on your reputation as a business contact?<\/p>\n

How Can I Create Strong Passwords?<\/h1>\n

What’s your advice regarding strong passwords?\u00a0How many different passwords does a business need? How many different passwords do individual people need? …<\/p><\/blockquote>\n

There are a lot of websites and software that require “strong” passwords by forcing their users to pick passwords with a few different classes\u00a0of characters, such as upper case letters, lower case letters, numerals, and special characters and provide a password of a certain length (usually greater than 8 characters).<\/p>\n

Password complexity is certainly a good start, but boiling it down,\u00a0the key to a strong password is length<\/strong><\/em>.<\/p>\n

Making a Strong Password? Length is King<\/h2>\n

Length<\/em> is very important as hackers apply brute force to figure out passwords, simply guessing one password after another, trying every possible\u00a0combination (with the aid of software). \u00a0If your password is only a few characters long, it doesn’t matter what it is, it will only take a few moments to crack<\/a>.<\/p>\n

Each character you add makes it exponentially <\/em>more difficult to crack, and according to SANS<\/a> (a widely-recognized authority on computer security and training) even an all lowercase, random password of 15 characters would take a determined hacker nearly 700 years to crack. \u00a0Match that to just five days for a 10 character password with uppercase, lowercase, and numbers.<\/p>\n

A Strong Password Example<\/h2>\n

If you simply use a dictionary word (or combination of multiple words) no matter how long or odd, the hacker is also likely to break in. \u00a0Why? Because their password cracking software checks passwords first against dictionary words as a shortcut. \u00a0Don’t expect simple character replacements to slow them down much, either, such as “S3att1e” — cracking software often checks for this and capitalization as well.<\/p>\n

However, passwords containing five or more dictionary words can be strong when not a common phrase or quotation and especially when intermixed with “special” characters such as spaces,\u00a0apostrophes,\u00a0asterisks,\u00a0tildes (~), etc.:<\/p>\n

Bob*Visit's\/us-often-in~Seattle!<\/pre>\n

That is a strong passphrase<\/em>\u00a0(as it contains multiple words). The cracker would have to “brute force” 32 characters (as the dictionary shortcut will not work), which will take well over hundreds of billions of days to crack (again, according to SANS’ excellent spreadsheet<\/a>).<\/p>\n

It is possible that a cracking program could accelerate the cracking of this password with use of a dictionary, but the goal here is to really avoid being low hanging fruit, and that password\u00a0certainly\u00a0accomplishes the task.<\/p>\n

For the slightly less paranoid, a more simplistic passphrase with five words is likely to suffice:<\/p>\n

Bob;visits;us;often;seattle<\/pre>\n

Furthermore this password is easy\u00a0to remember, which means the user will not have to write down the password, adding even more security (stopping\u00a0someone\u00a0from breaking into your network due to the Post-it-Note under the keyboard syndrome<\/a>).<\/p>\n

I’m not that creative, how do I come up with a strong passphrase?<\/h2>\n

Do you recommend using a password generator or a mnemonic device of some kind? …<\/p><\/blockquote>\n

For most folks, I think a long passphrase as explained above is the best approach (five or more words), balancing complexity with the ability to remember the password without\u00a0writing\u00a0it down.<\/p>\n

For IT professionals like myself (I have well over 200 passwords), a generator is a time-saver and most have a secure storage area. They also relieve us from memorizing each password (which is impossible at this scale). \u00a0The free KeePass<\/a>\u00a0software is a great way to manage passwords, just make sure you use a strong, easy to\u00a0remember, passphrase to secure KeePass.<\/p>\n

Should I use the same password for multiple sites?<\/h1>\n

Do you think people need a different password for every high-priority site – for online banking, etc.? …<\/p><\/blockquote>\n

Ideally users should have\u00a0different\u00a0passwords for each and\u00a0every\u00a0site and login. \u00a0If just one site gets hacked and your username and password are retrieved, the hackers can move onto other popular sites you use and gain access to your email, banking, and any other site that may share the same password.<\/p>\n

Stealing passwords should be impossible if best practices were followed, but it still happens (ask Sony<\/a>). You simply can’t trust all service providers to keep your information safe.<\/p>\n

Email account security is more\u00a0problematic\u00a0than most realize, as many sites allow you to reset your password via email messages. \u00a0Thus if your email account is taken over, the hacker has access to every site using this popular password reset method.<\/p>\n

Why are strong passwords so important now?<\/h1>\n

These attacks are happening more frequently. The reason is simple. Most people still use very weak passwords created years ago.<\/p><\/blockquote>\n

They are happening more frequently, and passwords are not the only culprit. \u00a0I believe the reason small businesses are now attacked more frequently comes down to 1) weak security (including passwords), making them easy targets, and 2) small businesses now have much more data worth stealing (such as electronic credit card information).<\/p>\n

The Wall Street Journal backs this up in their recent article, Hackers Shift Attacks to Small Firms<\/a>.\u00a0To hackers, breaking into a small business is like breaking into a house on a dead end street, with no street lights, a locked screen door for safety and no one home.<\/p>\n

While even Fortune 100 companies struggle with security and fight off attacks often, it’s easy to see why hackers go after the ill prepared low hanging fruit that is small business.<\/p>\n

In Closing…<\/h1>\n

Mark finishes his note with a strong summation:<\/p>\n

…<\/p>\n

The bottom line is that it’s not just about us individually anymore. If we have easy-to-crack passwords, we are basically saying we don’t care whether hackers can gain access to all our contacts<\/strong> – family, friends, businesses, everyone. Those hackers can send email containing very dangerous links to every one of our contacts. People who open these emails and click on these links are at risk of having their computers and data destroyed or severely compromised. We need to consider this every time we set a new password. We are not just putting ourselves at risk. We are putting all our associates at risk.<\/p><\/blockquote>\n

Please take a minute today and change any weak passwords you may have to a strong passphrase. Change any passwords that are over a year old and change a password immediately after you suspect, or are notified, of a breach (break-in where passwords may have been compromised).<\/p>\n

Stay safe out there!<\/p>\n","protected":false},"excerpt":{"rendered":"

Recently I got the following note about password security and how to make a strong password from Seattle Search Marketing Consultant Mark McLaren (edited\u00a0for brevity): My clients are having more trouble with hackers these days. WordPress is susceptible to hackers … Continue reading →<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[31,3,11],"tags":[70,69,72,71],"_links":{"self":[{"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/posts\/861"}],"collection":[{"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/comments?post=861"}],"version-history":[{"count":46,"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/posts\/861\/revisions"}],"predecessor-version":[{"id":1494,"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/posts\/861\/revisions\/1494"}],"wp:attachment":[{"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/media?parent=861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/categories?post=861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.redwireservices.com\/wp-json\/wp\/v2\/tags?post=861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}