Quotes Icon

Andrew M.

Andrew M.

VP of Operations

"We use TeamPassword for our small non-profit and it's met our needs well."

Get Started

Table Of Contents

    Hands typing on a laptop

    Importance of Good Password Management

    December 21, 20163 min read

    Cybersecurity

    Did you know that the average person spends up to 11 hours a day online?

    We are either online checking our email accounts, banking, shopping or on social media sites such as Facebook, Twitter and Instagram. When it comes to protecting these accounts, most people do not have strong passwords which can leave an opportunity for cyber thieves to hack your accounts and access your personal information.

    This year, Mark Zuckerberg (CEO Facebook) told an audience that the average person spends 50 minutes per day on Facebook, Instagram and Messenger platforms. Did you know that Facebook accounts are hacked 600,000 times daily during user’s log-in? In fact, Facebook records 1 billion logins each day and .06% of those logins are compromised. This was first reported by a UK-based computer security firm, Sophos. That being said, how many of us have the same password for Facebook and all of our other accounts such as financial services, email account, etc?

    The above stats show that we need to have strong passwords to prevent or at least make it more difficult for cyber thieves to access your personal information. Today, cyber thieves use software programs that can generate password combinations of personal information, addresses, middle names and phone numbers. These programs are capable of thousands of login attempts per hour to gain access to your personal information and data. Yes, these thieves are using more advanced technology to steal your information or they can simply guess.

    Always protect your personal information and data by creating a solid layer of defense by having strong passwords(change every 90 days) and utilize a password management tool such as LastPass or 1Password. If available, you can also use two-factor authentication. Below are some interesting stats and tips when creating a strong password.

    Table of Contents

      Top 5 common passwords to avoid:

      1. Numeric passwords such as 12345678.
      2. Numeric passwords with numeric repeated digits such as 1111, 00000 or 202020.
      3. Using the word password or variations such as p@ssword or passw0rd.
      4. Using the word, Qwerty. It’s the first keys from the left on the top row of your keyboard.
      5. Sports names such as football, baseball, yankees, spurs and anything related to sports

      How to create strong passwords?

      1. Use 12 characters or more.
      2. Include a combination of numbers, symbols, capital letters and lower-case letters.
      3. Avoid dictionary words or combination of dictionary words. Example, “house” or “red house.”
      4. Don’t rely on obvious substitutions such as “H0use.” This isn’t strong because you’ve simply replaced with the o with a 0.

      Some interesting stats:

      • Ninety percent of passwords generated by users are vulnerable to hacking.
      • One Billion Yahoo email accounts was compromised(hacked) in August of 2013. This does not include the breach that occurred and affected 500 million users in 2014.
      • Five Million Gmail passwords were hacked and released online in 2014.
      • Hackers stole 77 million Sony Playstation Network passwords in 2011.
      • The 2016 Identity Fraud Study released by Javelin Strategy & Research, found that $15 billion were stolen from 13.1 million U.S. consumers in 2015 compared to $16 billion and 12.7 million victims a year earlier. In the past six years, cyber thieves have stolen $112 billion.

      Please keep your data safe by creating STRONG passwords!

      Enhance your password security

      The best software to generate and have your passwords managed correctly.

      TeamPassword Screenshot
      facebook social icon
      twitter social icon
      linkedin social icon
      Related Posts
      Person typing on a laptop while looking at their phone, with graphic icons showing different web related things and a masked password

      Cybersecurity

      March 14, 20257 min read

      2FA vs MFA: Are they the same?

      Comparing 2FA vs MFA can be confusing. The fact is 99% of the time they are functionally the ...

      Outlines of people standing together with numerous lock security icons in front of them.

      Cybersecurity

      March 12, 202511 min read

      What Is Cybersecurity and How Do You Start a Career in the Field?

      Growing cyber threats put personal data and infrastructure at risk, creating a high demand for cybersecurity experts. Learn ...

      Group of happy people gathered around a tablet

      Cybersecurity

      March 11, 20258 min read

      Cybersecurity for Nonprofits: Keeping Your Nonprofit Secure

      Cybersecurity is critical for all organizations, including nonprofits. Learn more in this guide about cybersecurity for nonprofits.

      Never miss an update!

      Subscribe to our blog for more posts like this.

      Promotional image