Skip to main content

Are You Treating Your Password Like Your Toothbrush

Misbah enjoys learning about technology. She enjoys writing and sharing information, guides, reviews, and tech tutorials.

Do you know why it is important to use a strong password

A strong password is one of the most important defenses against most internet hacking attempts. If you don't follow best practices, you could be using passwords that cyber criminals may quickly crack in a matter of hours. Don't put yourself out there. Always be wary.

Passwords must be created to deal with modern password-stealing techniques. The weaknesses in your account IDs are a cyber criminal's dream. You will therefore have to take measures to avoid being the victim of password piracy.

Cybercriminals can get access to numerous of your personal accounts if your credentials are compromised. As a result, you'll want to design a password that is unlikely to be discovered by hackers. Passwords are created by the typical individual in order to fool and cheat human hackers.

A criminal would use whatever information he might find about you and will all use common password templates to guess your password. Prior to that, you could simply change the characters of your passwords and "secure" your accounts. However, the hackers noticed. Today, cybercriminals use the latest technology to find your passwords. This is important because a lot of people try to make passwords hard to guess, but don't think about efficient algorithms.

While guessing your credentials, the software is designed to take into account the conduct of users. Here are a few ways hackers access your accounts:

Do you know about the dictionary hacks?

Use an automatic program to combine the words of the standard dictionary. Users create passwords that are easy to remember, so hackers try to emulate obvious patterns.

The phishing- what’s that?

It is a fraud technique used by computer hackers which is very widespread on the web which aims to recover personal information (especially banking information, but also usernames and passwords) by usurping the identity of a third party. trust like your bank, your ISP, a public institution such as the Family Allowance Fund, Health Insurance, taxes, etc ...

Most often, the victim, therefore, receives an email appearing to come from a trusted company or institution and invites them to connect to their account via a link in the email to update their information, pay an invoice, consult his messages, etc…

The problem is that this link does not direct the Internet user to the official site, but to a website created by fraudsters which is often an almost identical copy of the original and which invites them to enter their username via a form. and password, bank details, bank card codes, or other sensitive personal data.

This personal data is of course recovered by the hackers who then have the free field to exploit this information and profit from it (use of the bank card on the internet, theft of your identity with government or banking services, telephone services, etc.

Social media and the spread of your important and personal information

It's used to specifically target you. Names, birthdays, and even the names of favorite sports teams are commonly used as passwords by users. Spending a little time on your social media pages might reveal a lot of this information about you.

The brute force attacks- what’s that?

Brute force assaults employ an automated software that recreates every conceivable character combination until the password is discovered. Brute force attacks, unlike the dictionary hacks, are not suitable for long passwords. Short passwords, on the other hand, can be quickly obtained in a matter of hours in some situations.

The previous data leaks

Past data leaks have already revealed numerous passwords and other sensitive data. A lot of Businesses and companies are increasingly being hacked, and hackers are collecting data for disclosure and benefit. This may be particularly dangerous if you have re-used old passwords, as it is very likely that outdated accounts have been compromised.

Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months.

— Clifford Stoll

Understanding the purpose of secure passwords

In general, there are two major ways in which passwords can be trusted:

The passphrases are based on a mixture of actual words. Unusual words that have mixed random characters and swapped have been used in the past, such as "Sw33tH0N3Y" instead of "SweetHoney".

Currently, hackers who use algorithms are familiar with this method, so the best passwords are generally made up of a mixture of unrelated common words, in an absurd order. Sometimes it may be a phrase that has been cut out and swapped into a format that only the user knows.

Passphrases are efficient because they:

  • Are easy to memorize.
  • Trick dictionaries and as well as brute force hacks.

Random strings are selected purely randomly by mixing all character types. Capital letters, lower case letters, symbols, and numbers are arranged in a random order in these passwords. Since no method exists to determine how the characters are organized, it is very difficult to guess them. Even hacking software can take years to detect these passwords.

Here is a sample random string: @N APpLe @ D@y K33p$ Y0u H3@lthY.

Random strings are effective because they:

  • Are pretty much impossible to guess.
  • Are extremely hard to hack.

Your protection is in your hands - create a strong password

In order to protect yourself from the latest hacking techniques, you will need strong passwords. Below you will find some tips to help you create a safe and strong password:

  1. Will you be able to remember it? Use terms that are significant to you, but that will be hard to guess for computers.
  2. Don't use overly obvious characters like using the number zero "0" instead of the letter "O". Nowadays, hackers code these replacements in their software, so avoid them.
  3. Try to use a minimum of 10 to 12 characters, but try to make it as long as possible.
  4. Make it hard to guess. Avoid using character strings like ("12345" or "ABCD"), as they can be hacked very easily with a brute force attack within a few seconds.
  5. Do you use unusual word combinations? Passwords may be safer if they contain unfamiliar terms. Even if you use common words, you can put them in a weird order and ensure they are not related. These two methods may prevent the piracy of dictionaries.
  6. Using various types of characters can help. You can use lowercase, capitalized, symbols and numbers in your password. Variety can make your password more unpredictable.
  7. Did you already use it? Reusing passwords compromise multiple accounts. Every time, try to make it unique.
  8. Do you use one rule that computers have trouble guessing? An example, could be a 3-word, 4-letter passphrase, where you swap the first two letters of each word with numbers and symbols


How you can create a strong and safe password:

  • It begins with a passphrase like “I enjoy ice cream!" And do you want to eat it in Paris?”
  • It should contain no less than 19 characters.
  • It uses special characters like * € &# @ + =
  • Use of both lower and capitalized letters should be included to make it secure

How to improve password:

  • Add special characters to make it longer. like: @#$%&
  • Add numbers, but not in order
  • Capitalization in between like: I @m aN AppLe LoVer

I changed all my passwords. I have no two passwords that are the same for any service online. I have two-step verification enabled on all my devices. So yes, I did take some extra steps that I hadn't taken before being exposed to this world.

— Zachary Quinto

How to manage so many unique passwords

With so many unique passwords to manage, you'll have to be careful about how you store them.

To avoid any risk, do not do the following:

  • It's a bad Idea to write the passwords on a piece of paper. Avoid it
  • Save the passwords into the Notes app on your phone.
  • Save the passwords in your browsers' automatic password manager.

On the other hand, it is advisable to use the following methods:

1. Enable two-factor authentication for all of your most important accounts. This is an additional security check after the password has been entered correctly. This verification uses methods that only you have access to, such as email, texting, biometric data (e.g., fingerprint or face ID), or a USB security key. 2FA authentication prevents crooks and spies from accessing your account, even if your password has been stolen.

2. Update your most important passwords often. When you decide to update them, be sure to change them entirely. It is dangerous to keep your password and change only a few characters. It is advisable to update your passwords at regular intervals, for example, every month.

Even if you don't update all passwords, be sure to change them for at least the following accounts:

  • online bank
  • Payment of invoices
  • Master password for the password manager
  • Social networks
  • E-mail
  • Phone operator

In the end, remember that while your password is easy to remember, hackers will be able to guess it just as easily. You can best protect yourself by using strong passwords. Keep changing your password every few months like you change your toothbrush.


Password Protection is Important

The Importance of Strong Passwords

Why Strong, Unique Passwords Matter

The Importance of Having a Strong Password

Why Strong, Secure Passwords are so Important

This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional.

© 2021 Misbah Sheikh


Misbah Sheikh (author) from The World of Rebels. on May 28, 2021:

Thanks a lot for your kind response, Vidya. Truly appreciated, dear friend.

Stay safe and healthy

Blessings and Love

VIDYA D SAGAR on May 28, 2021:

A very informative and important article Misbah. As cyber crimes are on the rise, one has to take all precautions to protect one's credentials from getting hacked. A strong password is crucial for protection from hackers. Well done.

Misbah Sheikh (author) from The World of Rebels. on May 28, 2021:

Are you treating your password like your toothbrush ?

Misbah Sheikh (author) from The World of Rebels. on May 28, 2021:

Thanks a lot for your kind and generous comments, Mr Bill. I highly appreciate that. God Bless you always

Stay safe and healthy


Bill Holland from Olympia, WA on May 26, 2021:

This article would have been greatly appreciated, by me, about ten years ago. Still, it is valuable information for many who simply do not understand how easy it is for a skilled hacker to obtain information. Well done, my friend. Blessings to you always!

Related Articles