Hi Friends,
I’m not going to be polite. I’m not going to be gentle. I’m going to stop you from being the next muppet.
Ending up on the wrong side of a password theft has happened to too many of my friends recently. From being locked out of a computer to having your aunt sent pictures on Facebook that she’d rather not have seen, the sob stories don’t read well. And you should do these three things today to make sure you’re not next.
Don’t be these two.
Your passwords should be random and generated by something other than you. Can’t remember all those weird characters? Cool. Neither can I. So:
Your new password manager will do most of the hard work from now on:
Keep ’em locked up
For crying out loud, stop using that {car} + {year} or {street} + {age} formula for your passwords. Stop using the road you grew up on. Stop using anything you can read. Stop it now!
For your most important accounts change your passwords immediately. Start with these:
When you select a new password, make sure you have your new Password Manager suggest the password. If it won’t suggest a password, use this tool. It’ll look like this:
w>9?=JXJ”<r3S’’<cH5yx`9a
But who cares; nobody is going to brute force that in a hurry. You don’t need to remember it so why not make it hard! The key here is to make sure that each password is different. Never use the same password again. Ever.
Go and turn on Multi-Factor Authentication for the above accounts. Make sure you do it for your email! Don’t know how? The most simple incarnation of this is the humble text message. When you try to log in company x sends you an sms, you enter the code in the text, and bingo. (Also treat this wee code like it’s your password. Never do anything with it except typing it into the website you’re logging into.) Apple can also have you authenticate from another device, whilst Google will do something similar with their app on iOS and Android. Whatever it is, make sure there is something physical that is required to get into your account. A phone that receives a text for example.
Three years ago I was in Italy. It was lovely. Whilst winding down over a beer from a day driving between the beaches of the Amalfi Coast I received the dreaded Call Me ASAP text message. My 2IC was incredibly competent and had pretty much everything handled. What could possibly have gone wrong?
Our policy that Multi-Factor Auth had to be turned on had slipped through the cracks. A password was compromised through a third party website; the email and password combination was out in the wild. (A simple nslookup will show you who hosts the mailbox for an email address).The email account was used to email our bank, convincing some poor girl there that James is away, and he’s left me in charge. She obediently sent, by FedEx Overnight, three cashiers checks (this was in the US of course) totalling USD50,000.
Boom! Fifty Grand!
It’s scarily simple to work out what many people’s passwords are, especially if they reuse them. And once you can access their email account you can pretty much reset all of their passwords.
Don’t be a muppet. Have you:
Do these and you’re about 90% of the way to being much safer online.