6 steps to protect your password from hackers
It is just not big news any more if a business leader finds his social media account hacked. So, when Google CEO Sundar Pichai’s Quora account was hacked recently, we were not surprised. Pichai’s Quora account was reportedly hacked by the same group who broke into Facebook CEO Mark Zuckerberg’s Twitter and Pinterest accounts.
When even tech CEOs are vulnerable, is anyone safe from cyberbreaches? Probably yes. All one needs is to be a bit careful and follow these simple tips.
password’, ‘123456’ or ‘abc123’ are terrible passwords because they’re easy to guess. One way to build a strong password is to think of a phrase or sentence that other people wouldn’t know and then use them to build your password.
For example, think of a personal message like “I want to see more Indian women in technology“ and then build your password from numbers, symbols and the first letters of each word –‘iw2sm!w!T’.
Just like you wouldn’t use the same key for your home, car and office, you should never use the same password across different websites. Some websites allow you to add an extra layer of security to your account by enabling a one-time password.
Often referred to as an ‘OTP’, this will require you to enter another ‘key’ or code to unlock your account in addition to your password.
Once you’ve created a strong password for each of your online accounts, it can be a challenge to remember them all. So consider using a trusted password manager that encrypts and saves your passwords and can be accessed with a single password and an OTP.
If you do forget your password or get locked out, you need a way to get back into your account. Many services will send an email to you at a recovery email address if you need to reset your password. So it’s important to make sure your recovery email address is up-to-date and is linked to an account you can still access.
Sometimes you can also add a phone number to your profile to receive a code to reset your password via SMS. Your mobile phone is a more secure identification method than your recovery email address or a security question because, unlike the other two, you have physical possession of your mobile phone.
Social networking sites allow you to share photos, videos, status updates and much more. Many of these services offer privacy settings and controls that help you decide who can see your content before you post it. Use it.