Personal-accounts_1

CAUTION: Personal Accounts Can Be a Gateway for Business Cyberhackers

SHARE

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken.

Carl

Personal accounts can be a gateway for business cyberhackers. Do not leave the door open for them.

With the increase in the number of data breaches for small business, owners need to secure their business and personal accounts from hackers. Cybercriminals often use LinkedIn and other social media profiles as a gateway into businesses, where they can gain illicit access to megabytes of sensitive data.

Mark Zuckerberg found out the hard way a few years back. A reported LinkedIn hack led to the exposure of additional accounts belonging to the Facebook (Meta) CEO. Despite his presumed savvy — after all, he is the world’s #1 social media magnate — Zuckerberg reportedly committed a series of fatal errors, including using an easy-to-crack password (dadada) on multiple accounts.

Shortcuts can be Dangerous

Using common words and the same password for more than one account are elementary no-nos. However, they are common mistakes made by otherwise knowledgeable users who do not want to memorize lengthy sign-in codes. It is an increasingly dangerous mistake now that hackers are more sophisticated. For example, recently the NSA, FBI, and other security agencies noted that the Russian General Staff Main Intelligence Directorate’s Russian (GRU’s) Main Center for Special Technologies has released new malware targeting the Americans and other users.

Fortunately, securing your personal account is easy. One simple measure is multi-factor authentication (MFA). MFA requires at least two independent factors to log into an account. One factor may be your password, and the second could be a one-time passcode sent to your phone. So, even if one factor is stolen your account will still be safe.

Increasing the length of the initial password or PIN (Personal Identification Number) is another good move. 7777 is one of the most common and easily guessed PINs. Almost all devices support PINs longer than 4 digits; and adding a few more numbers can make a big difference, thanks to the math involved. While a four-digit PIN has only 10,000 unique combinations, a six-digit PIN has 1,000,000.

Some devices support alphanumeric PINs or passwords to make it even harder for hackers. To make it easier on yourself, consider using words or phrases that mean something to you but are not generally known to others. Do not use special dates like birthdays, anniversaries, personal phone numbers, or street addresses.

Like numeric PINs, the longer the password is, the better. Take an eight-character password like betashow — with sophisticated software tools, an attacker could guess this password instantly. Now add four characters and make it betashowbest. An attacker could guess this 12-character password in less than two weeks. However, if we make it betashowbestshipping, it would take an attacker about 21 centuries to crack this 20-letter password; a big return for the small effort.

Also consider creative passphrases — longer passwords composed of multiple, random words. They are simple ways of making passwords longer. Like swiftest tropical downhill ski; walking on oranges, or BrieflyMoreDiamond (but do not use those, since they have appeared in a widely distributed newspaper column) and passphrases, which are harder to crack, do not have to be hard to remember. They can create pictures in your mind, like “purple nose on a brick wall.”

Or, imagine you have a noisy coworker. Every day you think, “I can hear Sam from across the office!” Something like this would make an excellent passphrase. Remember to avoid words that are related to each other. For example, the passphrase “gentle ocean breeze” is not as strong as “laptop pineapple car.”

Follow the rules to protect personal accounts

There are a few more angles to passwords and passphrases: it is important to know and follow your organization’s policy when creating them. Your company may require a minimum character account, a mix of alpha and numeric characters, or special characters. These security requirements are there for a reason. It is a good idea to comply with them. If they make it tougher on you, they also make it tougher on hackers.

Personal Accounts

Another point: More than 90% of us know that reusing passwords and PINs is risky, but about 60% of us reuse them anyway. It is convenient — because there are fewer things to remember — but password reuse and other bad habits put personal accounts at risk. Remember the Mark Zuckerberg example? It is always safer to create strong and unique passwords or PINs.

About now, you may be thinking that there is no way you can remember each password for each device: your mobile device, laptop, desktop, iPad, business laptop, and more. But there is a solution for that. Your organization may offer a password manager or a software application that securely stores and manages online credentials. It sits behind a master password — so you only have one password to remember — and the manager automatically generates new passwords every time you log into a device.

However, this is not the same as storing your passwords in the browser. Think of a password manager as a secured vault: Once all your account usernames and passwords have been put into the vault, your master password is the only one you have to commit to memory. Entering your master password unlocks your password vault, and from your VAULT, you can retrieve whatever password you need.

Whichever method you utilize, it is vital to keep your personal account secure. Never write them down. You may think your hiding place is good, but it is still likely someone could find your password, master password, or PIN. Similarly, do not create a file on your computer to store your login information, even if you encrypt it. Finally, avoid sending yourself PINs or passwords via email or text.

Another best practice: do not share your password or PIN. You never know if someone else will keep your credentials secure. And at work, you may be held accountable for anything that happens when someone is logged in with your credentials So if you have previously shared your password or PIN, now is a good time to change it.

Finally, “shoulder surfing” is another danger you need to watch out for. Shoulder surfing is when a cyber-thief tries to steal your password or PIN by watching you enter it. Remember to be vigilant and aware of your surroundings when entering passwords, master passwords, passphrases, or PINs. Make sure no one can see what you are typing.

It takes time and effort to establish and safely maintain secure passwords. However, your digital data can be worth its weight in gold, and with more lurking threats than ever before, it is only reasonable to take more precautions to safeguard this treasure.

Carl Mazzanti is the president of eMazzanti Technologies – a firm specialized in Cyber Security in New Jersey

Multi-Factor Authentication

Passwords are no longer enough.

Dark Web Monitoring

Is your information on the Dark Web?

We go into the dark web to keep you out of it

Free Cyber Security Assessment

The time is NOW to begin planning your Cyber Security Strategy

UPCOMING VIRTUAL EVENTS

Demystifying Cyber Security for SMBs

sb-cyber-security-master-class

The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.

SESSION 4: Cyber Security Strategy
Watch On-Demand

SESSION 5: Cyber Insurance & MFA
Watch On-Demand

SESSION 6: Threat Detection | OCT. 16

Microsoft Copilot
Master Class Workshop

sb-microsoft-copilot-master-class

eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.

In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.

RESOURCES

Cyber Security Awareness Hub

sb-Cyber-Security-Awareness-Hub

Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.

We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.

Resource Library

sb-resource-library

Insights to help you do what you do better, faster and more profitably.

> Tips to Stay Protected Against Phishing Attacks

> Understanding Ransomware 

> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them

> Practical Advice for Avoiding Phishing Emails

Recent Articles

NEWSLETTER

Categories