In today's digitalised economy, passwords are the guardians of our virtual identities, yet they often seem like an inconvenience rather than a necessity. From logging into social media accounts to accessing sensitive work documents, passwords have become the ubiquitous gatekeepers of our digital lives.

But with their ubiquity comes vulnerability, as cybercriminals employ sophisticated methods to exploit weak passwords and breach our defences. The consequences of a hacked password can be dire, ranging from identity theft to compromised financial security. Therefore, understanding the myriad ways in which passwords can be compromised is paramount to safeguarding our online presence.

In this guide, we will explore the various techniques employed by hackers to steal passwords and infiltrate accounts, as well as actionable steps to fortify our digital fortresses and emerge unscathed from the onslaught of cyber threats.

Contents

Tags

Share:

arrow arrow arrow

How many passwords do you use in a given day? Almost everything on the internet requires a password. It can be tricky to keep track of them while thinking up new strong passwords, and before you know it, they’ve expired, and you have to create a new one all over again – frustrating!

Disdain for passwords leads to many bad password practices. These include reusing passwords or keeping them basic. However, steps to make passwords easier to remember also make them easier for hackers to guess.

The password is often the last line of defence between criminals and your work and life data. So, with this in mind and for your password safety, we’ve broken down ways to get hacked and how to avoid being hacked!

Ways you can get hacked

Before we delve into how to avoid your password getting hacked, let’s first learn about the different techniques cybercriminals use to steal your passwords and break into your accounts.

Social Engineering

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

Social engineering is especially dangerous because it relies on human error rather than software and operating systems vulnerabilities. Mistakes made by legitimate users are much less predictable, making them harder to identify and thwart than a malware-based intrusion.

Learn about Phishing emails and how to avoid falling for them.

Dictionary attacks

Avoid repeated keyboard combinations— such as qwerty, asdfg or 12345. Don’t use dictionary words, slang terms, or words spelt backwards. These cracks rely on software that automatically plugs common words into password fields. Password cracking becomes almost effortless with a tool like John the Ripper or similar programs.

Brute force attack

Like the dictionary attack, the brute force attack comes with a bonus for the hacker. Instead of only using words, a brute force attack lets them detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10.

Spidering

Savvy hackers have realised that many corporate passwords are made up of words that are linked to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack.

Hackers have automated the process and let a spidering application, like those employed by leading search engines to identify keywords, collect and collate the lists for them.

Cracking security questions

Many people use first names as passwords, usually the names of a loved one (or pets) all of which can be deduced with a little research. Clicking the “forgot password” link within a webmail service or other site, sometimes asks you to answer a question or two. More often than not, the answers can be found on your social media profile.

Simple passwords

Don’t use personal information such as your name, age, birth date, loved one’s name, pet’s name, or favourite anything. When 32 million passwords were exposed in a breach last year, almost 1% of victims were using “123456.” The next most popular password was “12345.” Other common choices are “111111,” “princess,” “qwerty,” and “abc123.”

Reuse of passwords

Reusing passwords for email, banking, and social media accounts can lead to identity theft.

Password protection is only effective against hacks if you are sensible when creating and using your password. The easiest way to make yourself vulnerable to being exploited by criminals or opportunists is to create an obvious password like PASSWORD 1 or 123456. These passwords are so prevalent that they are next to useless as a barrier for your security. So here are some tips for checking your password protection is effective.

How you can avoid getting hacked?

Practice good password hygiene

Although annoying and hard to keep track of, always use different passwords for each account. To help you keep track of your passwords, use a password manager – they also generate strong passwords for you.

If you don’t want to use a password manager, check out our advice on how to create a strong password. The blog includes advice like:

  • Use a mixture of upper- and lower-case letters, numbers and symbols.
  • We suggest picking two or more unrelated words to create your passwords, e.g. yellow turkey. So, we could make our password [y3lL0w?7urK3y!] – as you can see, we’ve used the above two rules and this one.
  • Don’t use your first name, or others in your family to create a password.

Check out our guide on password safety “12 Good Password Habits to Make

Lock your screen

Always lock or log off devices if you are walking away from them – even if no one’s around, it’s good to build up a routine.

Avoid public WiFi and computers

Where possible, avoid using public WiFi (like a coffee shop) – hackers can quickly gain your passwords and other data through unsecured networks.

You should also avoid logging into accounts on computers you don’t directly control, like library computers – they could be infected with password-stealing malware.

Keep passwords a secret

Never tell anyone your password, whether they’re your friend or trusted colleague – keep them to yourself, it’s better to be safe than sorry.

Never write your passwords down on a sticky note, on your computer, in your notebook or anywhere – you never know who could go snooping.

And never send your password by email or text!

Social media

It’s all too easy to share your birthday, wedding anniversary, child’s name, favourite sports teams, etc. on social media. Facebook accounts with little security measures make it easy for hackers to learn about you. So avoid putting personal details on social media and always make sure your accounts are as secure as they can be.

Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation previously said. “When you post your photos to Instagram, or you make posts to Facebook, or you tweet something about your location, people can take that stuff, put it into another context, and suddenly you have been doxed. What people can really give away about you is the stuff that you’ve already given away about yourself.”

As well as a password manager, multi-factor authentication (MFA) should be turned on for as many sites and services as possible. This is one of the most effective ways to secure your accounts from hackers. The most common type of MFA is two-factor authentication where another piece of information, on top of your password, is required to login to a service. Most commonly this is an SMS message, authenticator app, or physical security key. A list of websites and apps supporting 2FA can be found here.

With all these tips and tricks, you should be fully equipped to create strong passwords of every one of your accounts! But if you find yourself wanting tighter security, please get in touch with one of our experts!

arrow

In the realm of cybersecurity, vigilance is the key to resilience. By adopting good password hygiene practices and leveraging technological safeguards such as password managers and multi-factor authentication, we can bolster our defences against malicious actors lurking in the digital shadows.

Remember, securing our digital identities is not a passive endeavour but an ongoing commitment to safeguarding our online presence. Let us empower ourselves with knowledge and proactive measures to navigate the treacherous landscape of cyberspace with confidence and peace of mind.

Together, we can thwart the nefarious intentions of cybercriminals and preserve the integrity of our digital domain. Stay vigilant, stay secure, and may your passwords always be strong and unyielding against the tide of cyber threats.

arrow

Netitude Industry Insight

11.07.24

New IoT Laws: Boosting Your Business's Cybersecurity

#Cybersecurity #Industry Insights
bottom arrow
01.07.24

How Will the 2024 UK General Election Shape the Future Tech Landscape?

#Industry Insights
bottom arrow
28.06.24

Breaking Down the Cyber Essentials Accreditations

#Cybersecurity #Industry Insights
bottom arrow

Subscribe here!

Read our Privacy Policy