Having birthdates and pet names inside passwords that meet complexness rules is nevertheless making cyberattackers’ jobs easier
While it may seem endearing and easy to remember, using your pet’s name in a complex password can pose significant security risks.
In an era where personal information, banking and financial data are increasingly managed online, passwords serve as the first line of defence, therefore having robust, secure passwords is essential. With passwordless authentication and single-sign-on systems yet to become mainstream, using guessable passwords is a step backward in cybersecurity.
Yet, many pet owners use their pet’s name in passwords because the resultant password can still meet platform requirements and it is easier to remember due to the emotional significance. While this symbolic gesture can feel familiar and comforting, it nevertheless highlights a concerning trend in digital security. The passwords are often based on easily guessable information, which makes them vulnerable to hacking attempts.
Use strong, unique passwords
Good password hygiene is essential to safeguarding against cyberattacks, malware actions and password breaches. A strong password should be at least 16 characters long, and include a mix of uppercase and lowercase letters, numbers and symbols. To enhance security, avoid using common dictionary words, personal information like pet names or birthdays, as well as sequential numbers.
For example, a password like “ILoveFluffy*1” may meet platform requirements, but it is still weak due to its predictability and connection to personal information easily found online.
If crafting strong, unique passwords seems challenging, consider using a password or passphrase generator. These tools create random passwords based on specified criteria, or they can generate passphrases that offer more-secure login credentials. Password managers often also justify their cost by including built-in password and passphrase generators, storing passwords in an encrypted digital vault, and alerting you to weak or reused passwords that need fixing.
Additional ways of password security
In addition to using strong passwords, never reuse the same password across multiple platforms. For instance, if you use “Password1234!” for all your online accounts, a cybercriminal who discovers this password could gain access to your banking information, shopping accounts, social media profiles and more. This practice, known as credential stuffing, exploits password reuse and puts your entire digital landscape at risk.
Beyond strong passwords, consider enabling passkeys when available. Passkeys are cryptographic keys that allow you to log in to accounts without relying on traditional passwords. They typically work in conjunction with biometric information, like fingerprints, face ID or device-specific authentication methods. Since passkeys are unique to your device and cannot be phished, they provide a higher level of security compared to traditional passwords. This makes it extremely difficult for cybercriminals to gain unauthorized access to your accounts.
If Multi-Factor Authentication is available, take advantage of this added security feature. This extra layer of security means that even if cybercriminal obtain your login credentials, they would still need additional ways to obtain the authentication key before they can access your accounts.
While we love our pets, cybercriminals would love them even more if their names were used as passwords. By adopting strong, unique passwords and utilizing password management tools, you can significantly enhance your online security and enjoy safety with your best friend.