Password Managers: You Really Should be Using One.

 

Admit it!  You use and recycle the same passwords for your email, social media and online banking accounts, regardless of what security experts say.

You’ve had those accounts for a long time and you haven’t been hacked or scammed, so why fix what isn’t broken, right?

That’s probably what Mark Zuckerberg (yes, the Facebook guy!) thought so too until a Linkedin data breach led to Zuckerberg’s Twitter and Pinterest accounts getting hacked because—you guessed it—it shared the same “dadada” password.

Think you’re more creative? Not so fast.

Google’s research on how people create passwords revealed that the number one thing people still do most is use their pet’s name.  Also popular are their birthplace; one of their kids’ names or nicknames; their favorite number or vacation spot; and, believe it or not, “password” is still a popular choice for some people.

Hackers are crooks, not idiots.

They already know every trick in the book for guessing passwords and are adept at using social media to gather your information.

Also, as it turns out, the key to cracking passwords is a flaw in our brains: Our minds are not good at creating random combinations of words or letters, but are influenced by memories or pop culture tastes, which leads to non-random (and vulnerable) passwords.

“If your password is not random, we will crack it,” said password expert-cracker Jeremi Gosney, who once deciphered 90% of a sample of more than 16,000 passwords downloaded from the internet in 20 hours as part of a contest.

And truth is, with all the data breaches in recent years, it may only be a matter of time before you become a target, just as I have recently been targeted by a scam.

Still not convinced? Test yourself

  1. Do you use the same password over and over?
  2. Do you use a slightly modified version of the same password (adding a different number, letter or capitalization)?
  3. Do you use one of a few of your “go-to” passwords that you rotate for new online accounts
  4. Do you forget which “go to” password you used or which slightly modified version you used?
  5. Do you still use an incredibly simple password…like “1234” or “p@$$word”?

If you answered “YES” to any one of the questions above, you should use the WIMIA email brach check to investigate whether your user credentials have been compromised.

Most of us rarely think about password safety, so maybe now’s a good time to rethink or update your password strategy.

Simplify your life with a Password Manager.

Even though our brains aren’t actually bad at remembering a few simple passwords, remembering dozens of unique, strong passwords is almost impossible. You can give your brain a little help by using a password manager.

A password manager is an application – essentially a digital secretary – that automatically creates strong random passwords for each one of your accounts and stores all of them in a single vault secured by a master password.

Most password managers don’t even require you to type passwords because they autofill forms and offer a handful of other useful password features.

You Still Need to Remember One Password

Of course, even with a password manager, there’s still the matter of creating and remembering the ONE password that unlocks the “vault” where your other secure data is stored: Usernames and passwords, credit card numbers, secure notes, attachments, contact information, software licenses, etc.

But you should forget about long gobbledygook strings of capital letters, symbols, and numbers.

The easiest way to create a secure master password is to make a passphrase: several random but pronounceable—and thus easier to memorize—words.

For example, maybe these words would come to you one morning while you’re brushing your teeth: BabeRuth green eggs NFL world cup.

Tip: Make sure these “random” words are not things you shared on social media as your list of favorite things! (Remember, that’s where online thieves go looking for clues.)

Ready to Get Started with a Password Manager?

Here are some resources for you to look at:

1Password — If you’re a Mac and iOS user, then 1Password is definitely the one for you.  It was originally developed for Apple products (although it has steadily expanded its offerings for Windows, Android, and ChromeOS). 1Password’s interface is the most elegant of the bunch, with numerous small touches that make it easier to use. It also offers a wide variety of syncing options, including one that doesn’t store any data in the cloud.  It can also generate and display the one-time passwords used by many two-step authentication managers, substituting for apps like Google Authenticator or Authy.  1Password has never offered autofilling as an option, much less a default, so that’s another layer of added security.

Dashlane — Available for Android, iOS, Mac and PC, Dashlane is a robust password manager that comes with a security dashboard, AES-256 encryption, and optional cloud syncing.  Dashlane’s strong-yet-subtle browser integration makes logging into websites a seamless operation.  And once a password is stored in Dashlane, it can log you in automatically every time the website is loaded or autofill the credentials without logging you in.

LastPass — LastPass is an easy-to-use password manager and one of the most popular out there.  It offers features like login credential syncing for multiple browsers, AES-256 encryption, and a handy feature called Auto Change Password that works with about 80 popular sites.  You can access most of its features for free, although the free version locks you on one platform for syncing across devices. LastPass Premium offers additional 1GB cloud storage, desktop application logins and fingerprint identification, plus expanded support for two-factor authentication tokens like YubiKeys.

KeePass —  KeePass is one of the most trusted open-source password managers available for Windows, Linux, as well as macOS. It’s free, easy to use, and very portable, because you can transfer the program to a USB flash drive and copy it to a new computer on the fly.  KeePass supports import and export of your password data in common formats like HTML and TXT. It also includes two-factor authentication, as well as protection against dictionary and guessing attacks, autofill and more.

Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.