How to Create a Strong Password

With the widespread use of computers and mobile devices, password security has become an important part of computer security. Bank, email and social networking accounts store personal information--such as date of birth, address and even credit card numbers--which are protected only by a password.


Passwords are necessary to keep your accounts safe and to prove that you are who you say you are. The most efficient password should be strong enough to thwart hackers, yet easy enough for you to remember.

How to create a strong password
Your confidential information is probably not safe unless you use at least an 8-digit randomized password. If you use less than 8 characters, and you restrict your characters to only alphabetic letters, it can be cracked in minutes. Many systems now require passwords to be at least 8 characters in length. Studies reveal that the longer and more complex the password, the harder it is to crack.


A strong password should:
• Be at least 8 characters in length
• Contain both upper and lowercase alphabetic characters (e.g. A-Z, a-z)
• Have at least one numerical character (e.g. 0-9)
• Have at least one special character (e.g. ~ ! @ # $ % ^ & * ( ) - _ + =)


A strong password should not:
• Spell a word or series of words that can be found in a standard dictionary (e.g. angrybirds, mypassword, daisymae)
• Spell a word with a number added to the beginning and/or the end (e.g. johnsmith1, password123, daisy8703)
• Be based on any personal information such as user id, family name, pet, birthday, etc. (e.g. johnsmith, mydogrover, 10311978)
• Be based on a keyboard pattern (e.g. qwerty) or duplicate characters (e.g. asdfgh, aabbccdd, 456789)

Use a passphrase or a nonsensical word
Rather than trying to remember a password created using various character types which is also not a word from the dictionary, you can use a passphrase. Think up a sentence or a line from a song or poem that you like and create a password using the first letter from each word.

A passphrase could be a lyric from a song or a favorite quote. An example of a strong passphrase is “Superman is $uper str0ng!”. A nonsensical word can built using the first letter from each word in a phrase (e.g. C$200wpG., represents "Collect $200 when passing Go."). These typically have additional benefits such as being longer and easier to remember.

Each system or application may have different password restrictions or requirements. Unfortunately, some systems don’t allow the use of special characters (e.g. ~ ! @ # $ % ^ & * ( ) - _ + =), so when you’re confined to letters and numbers, you’ll need to make extra sure the password you create is complex enough.
Grab a piece of paper and a pen and practice creating strong passwords by modifying the following phrases. For example:

“She loves you yeah, yeah, yeah!” could be modified to: sLuY3ah!

Now it’s your turn.
• I sense great fear in you, Skywalker.
• The hills are alive with the sound of music.
• Holy haberdashery, Batman!

Check the strength of your password
It’s a good idea to check the strength of the password you’ve created. Some websites offer a built-in password checker that evaluates the strength of your password when you’re setting up your account. But if you want to check the strength of your other passwords, try using Microsoft’s password checker.

How to Protect your Smart Phone

Keep Your Mobile Device Secure from Malware



Today, smartphones and other mobile devices are playing a major role in how people are entertained, communicate, network, work, bank, and shop. The number of smart mobile devices in the world has increased dramatically in recent years, and so has the challenge to find ways to secure those mobile devices.

While security software is commonly used on laptops and desktops,the majority of mobile devices today remain devoid of security protection and are exposed to a new and growing breed of mobile malware. Malware may result in device or data corruption, data loss, the unavailability of necessary data and more.

Mobile malware is different from PC malware in that it doesn’t spread randomly via unknown sources or random phishing emails. Instead, mobile malware is actively installed by users who download and install infected apps from an app store, either Apple’s or the various Android stores. The attacker convinces the store that the app is legitimate and it performs as expected while it gains a fan base. Soon after, it begins its malicious behavior. As with PC malware, the authors of malicious mobile apps are all about making money.
Unfortunately, there is no straightforward, one-size-fits-all remedy to the mobile security problem, but there are definite steps you can take to protect your device and ultimately, your personal information.

First, ensure that you use the following three core components to keep your mobile device secure. When combined, they provide a significant challenge for hackers.
  • Device auto-lock - Configure your device to lock automatically after a period of time. Only those with knowledge of the passcode can unlock the device.
  • Device encryption – Protect your mobile device by preventing access from intruders, eavesdropping or interception of data in transit by using encryption technology.
  • Remote wiping - Install remote locate, track, lock, wipe, backup and restore software to retrieve, protect or restore a lost or stolen mobile device and the personal data on that device.

Follow these tips to keep your mobile device secure and to protect your data and privacy against the growing mobile malware threats.

  1. Do not circumvent or disengage security features such as passcodes and auto-locks.
  2. Set the device to lock after a set period of inactivity. A recommended inactive period setting is 10 minutes or less.
  3. Ensure that you have GPS device location in the event of theft or loss.
  4. Use caution when downloading apps and free software, especially from unsanctioned online stores.
  5. Install an on-device personal firewall to protect mobile device interfaces from direct attack.
  6. Install anti-spam software to protect against unwanted voice and SMS or MMS communications.
  7. Install real-time anti-malware technology via cloud services that continually analyzes and re-analyzes websites and mobile applications. Protect against malicious applications, spyware, infected secure digital (SD) cards and malware-based attacks.
  8. Turn off “beaming” (infrared data transmission).
  9. Turn off the Wi-Fi when you’re not using it; and avoid using public, unsecured Wi-Fi hotspots.
  10. Before discarding any device, make sure it is wiped clean and restored to factory defaults.
  11. Threats to mobile devices are pervasive and escalating. Through malware, loss and theft, misconduct, and direct attacks, users are increasingly susceptible to devastating compromises of mobile devices.
  12. Don't not let your mobile devices be used by children, who frequently download cool-looking but unknown free apps that might be malicious.
Use the knowledge we've provided here to keep your mobile device secure and you will be much more prepared to enjoy the conveniences of online services with peace of mind!