{"id":27460,"date":"2018-01-11T13:14:56","date_gmt":"2018-01-11T18:14:56","guid":{"rendered":"https:\/\/www.computeradvantage.us\/v3\/?p=27460"},"modified":"2018-01-11T10:15:44","modified_gmt":"2018-01-11T15:15:44","slug":"five-things-you-should-never-do-with-passwords-and-three-you-should","status":"publish","type":"post","link":"http:\/\/www.computeradvantage.us\/v3\/five-things-you-should-never-do-with-passwords-and-three-you-should\/","title":{"rendered":"Five Things You Should Never Do with Passwords (and Three You Should)"},"content":{"rendered":"<p>Passwords are the bane of our modern existence. Nearly anything you want to do, it seems, calls for a password. As the Internet\u2019s reach extends beyond computers and into phones, TVs, appliances, and even toys, we have to enter passwords with increasing frequency and in ever more annoying ways.<\/p>\n<p>To make dealing with passwords easier and more secure, everyone should use a password manager like <a href=\"https:\/\/1password.com\/\">1Password<\/a> or <a href=\"https:\/\/www.lastpass.com\/\">LastPass<\/a>. Such apps generate random long passwords like kD*SSDcCl7^6FN*F, store those passwords securely, and automatically enter them for you when you need to log in to a Web site. They are essential in today\u2019s world.<\/p>\n<p><img decoding=\"async\" data-src=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Password-Rules-manager-icons.png\" data-sizes=\"(max-width: 287px) 100vw, 287px\" data-srcset=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Password-Rules-manager-icons.png 608w, https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Password-Rules-manager-icons-300x163.png 300w\" alt=\"\" width=\"287\" height=\"156\" data-attachment-id=\"5618\" data-permalink=\"https:\/\/tcn.tidbits.com\/five-things-you-should-never-do-with-passwords-and-three-you-should\/password-rules-manager-icons\/\" data-orig-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Password-Rules-manager-icons.png\" data-orig-size=\"608,330\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Password-Rules-manager-icons\" data-image-description=\"\" data-medium-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Password-Rules-manager-icons-300x163.png\" data-large-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Password-Rules-manager-icons.png\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 287px; --smush-placeholder-aspect-ratio: 287\/156;\" \/><\/p>\n<p>You\u2019ll still need a few passwords you can remember and type manually\u2014for instance, the master password for your password manager and your Apple ID password. Make sure those passwords are at least 12 characters, and we recommend going to at least 16 characters.<\/p>\n<p>If you\u2019re unsure of the best way to create a strong password, try taking the first letter of each word in a sentence you can remember, and also change a few words to digits. Then \u201c<i>Now is the time for all good men to come to the aid of the party!<\/i>\u201d becomes a password along the lines of\u00a0<code>Nitt4agm2c2ta0tp!<\/code>. So that no eavesdroppers learn your password, avoid saying your sentence out loud whenever you enter it! Or, combine four or five unrelated dictionary words, like\u00a0<code><a href=\"https:\/\/xkcd.com\/936\/\">correct-horse-battery-staple<\/a><\/code>, that add up to at least 28 characters. (Don\u2019t use the examples in this paragraph!)<\/p>\n<p>When possible, take advantage of two-factor authentication on sites like Apple, Google, Dropbox, Facebook, Twitter, and more. Accounts protected by two-factor authentication essentially require that you enter a second, time-expiring password as part of the login process. You\u2019ll get that second password via text message, authenticator app, or other notification method when you log in.<\/p>\n<p><img decoding=\"async\" data-src=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor-1080x386.png\" data-sizes=\"(max-width: 691px) 100vw, 691px\" data-srcset=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor-1080x386.png 1024w, https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor-300x107.png 300w, https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor-768x275.png 768w, https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor-1080x386.png 1080w\" alt=\"\" width=\"691\" height=\"247\" data-attachment-id=\"5619\" data-permalink=\"https:\/\/tcn.tidbits.com\/five-things-you-should-never-do-with-passwords-and-three-you-should\/apple-two-factor\/\" data-orig-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor.png\" data-orig-size=\"2884,1032\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Apple-two-factor\" data-image-description=\"\" data-medium-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor-300x107.png\" data-large-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2018\/01\/Apple-two-factor-1080x386.png\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 691px; --smush-placeholder-aspect-ratio: 691\/247;\" \/><\/p>\n<p>But what we really want to talk about today is what you should <b>not<\/b> do with passwords. Follow these tips to avoid making mistakes that can undermine even the security provided by a password manager.<\/p>\n<ol>\n<li>Don\u2019t use the same password twice. This is key, because if the bad guys get your password\u2014no matter how strong\u2014for one site, they\u2019ll try it on other sites.<\/li>\n<li>Don\u2019t share passwords with anyone you don\u2019t trust completely. That\u2019s especially true of passwords to accounts that contain sensitive information or that can be used to impersonate you, like email and social media. However, sometimes you have to share a password, such as to a club blog with multiple authors. In that case\u2026<\/li>\n<li>Don\u2019t send passwords to shared sites via email or text message. If someone hacks into your recipient\u2019s email or steals their phone, the password could be compromised. Instead, use a site like <a href=\"https:\/\/onetimesecret.com\/\">One-Time Secret<\/a> to share a link that shows the password only once, after which the recipient should put the password into their password manager.<\/li>\n<li>Don\u2019t write your passwords on sticky notes. Yeah, it\u2019s a clich\u00e9, but people still do it. Similarly, don\u2019t put all your passwords in a text file on your computer. That\u2019s what password managers are for\u2014if someone steals your computer, they can\u2019t break into your password manager, whereas they could open that text file easily.<\/li>\n<li>Don\u2019t change passwords regularly if you don\u2019t have to. As long as every site has a strong, unique password, changing a password is a waste of time, especially if doing so makes you write down the password or communicate it insecurely. If you do have to update a password regularly, a password manager makes the task much easier.<\/li>\n<\/ol>\n<p>We realize that it\u2019s tempting to take the easy road and share a password with a friend via email or write a particularly gnarly one on a sticky note. But today\u2019s easy road leads directly to identity theft and is paved with insecure password habits. You might think no one would pay attention to little old you, but times have changed, and organized crime is interested in any Internet account that can be cracked.<\/p>\n<hr \/>\n<p><strong>Social Media:<\/strong> Want to avoid online identity theft? Use a password manager, strong passwords, and two-factor authentication. But there are also some insecure password habits that can undermine your security\u2014read on to learn what NOT to do.<\/p>\n<p class=\"wpematico_credit\">\n","protected":false},"excerpt":{"rendered":"<p>Passwords are the bane of our modern existence. Nearly anything you want to do, it seems, calls for a password. As the Internet\u2019s reach extends beyond computers and into phones, TVs, appliances, and even toys, we have to enter passwords with increasing frequency and in ever more annoying ways. To make dealing with passwords easier [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":27461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"wds_primary_category":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[331,157,193,66,39,71,332,333,123,196,124],"tags":[],"class_list":["post-27460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-1password","category-apple-pros","category-apros-archive","category-article","category-blog","category-explainer","category-lastpass","category-password-manager","category-passwords","category-restricted-content","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2018\/01\/Password-Rules-manager-icons.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6YLEm-78U","jetpack-related-posts":[{"id":26166,"url":"http:\/\/www.computeradvantage.us\/v3\/understanding-two-step-verification\/","url_meta":{"origin":27460,"position":0},"title":"Understanding Two-Step Verification","author":"computeradv","date":"December 28, 2016","format":false,"excerpt":"For your most important accounts, things like email, social media, cloud services, and banking, you should go beyond a password and protect them with two-step verification. Learn more on our blog.","rel":"","context":"In &quot;Article&quot;","block_context":{"text":"Article","link":"http:\/\/www.computeradvantage.us\/v3\/category\/article\/"},"img":{"alt_text":"What is Two-Step Verification?","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/12\/2SV-photo-1080x675.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":33385,"url":"https:\/\/www.computeradvantage.us\/v3\/how-to-take-the-annoyance-out-of-your-key-passwords-and-passcodes\/","url_meta":{"origin":27460,"position":1},"title":"How to Take the Annoyance Out of Your Key Passwords and Passcodes","author":"computeradv","date":"August 19, 2021","format":false,"excerpt":"Password managers are essential, but you must still remember and enter some passcodes and passwords. Read on for our advice on how to create ones that are secure, memorable, and easy to type.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"http:\/\/www.computeradvantage.us\/v3\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/08\/how-to-take-the-annoyance-out-of-your-key-passwords-and-passcodes.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/08\/how-to-take-the-annoyance-out-of-your-key-passwords-and-passcodes.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/08\/how-to-take-the-annoyance-out-of-your-key-passwords-and-passcodes.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/08\/how-to-take-the-annoyance-out-of-your-key-passwords-and-passcodes.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/08\/how-to-take-the-annoyance-out-of-your-key-passwords-and-passcodes.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":31848,"url":"https:\/\/www.computeradvantage.us\/v3\/5-new-years-resolutions-that-will-improve-your-digital-security\/","url_meta":{"origin":27460,"position":2},"title":"5 New Year\u2019s Resolutions That Will Improve Your Digital Security","author":"computeradv","date":"January 11, 2021","format":false,"excerpt":"Have a safer 2021 with New Year\u2019s resolutions that will help you secure your devices, avoid email and text scams, and stay safe from malware, as well as benefit from the security and ease-of-use of password managers, which can even fill in passwords for iPhone apps.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"http:\/\/www.computeradvantage.us\/v3\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":30452,"url":"https:\/\/www.computeradvantage.us\/v3\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account\/","url_meta":{"origin":27460,"position":3},"title":"To Prevent Spearfishing, Set a PIN or Passcode on Your Cell Phone Account","author":"computeradv","date":"March 2, 2020","format":false,"excerpt":"It\u2019s shockingly easy for someone to take over your cell phone number. Once they\u2019ve done that, they can reset passwords on many of your online accounts. Read on to learn how to protect your cell number with a PIN or passcode.","rel":"","context":"In &quot;Article&quot;","block_context":{"text":"Article","link":"http:\/\/www.computeradvantage.us\/v3\/category\/article\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/02\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/02\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/02\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/02\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/02\/to-prevent-spearfishing-set-a-pin-or-passcode-on-your-cell-phone-account.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":26710,"url":"http:\/\/www.computeradvantage.us\/v3\/get-two-factor-authentication-working-in-older-apple-systems\/","url_meta":{"origin":27460,"position":4},"title":"Get Two-Factor Authentication Working in Older Apple Systems","author":"computeradv","date":"June 14, 2017","format":false,"excerpt":"Apple is increasingly encouraging us all to turn on two-factor authentication for our Apple IDs because it adds an extra layer of security on top of the password. With two-factor authentication, when you log in to iCloud or iTunes for the first time on a new device, it prompts you\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"http:\/\/www.computeradvantage.us\/v3\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/tip-2FA-older-systems.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/tip-2FA-older-systems.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/tip-2FA-older-systems.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/tip-2FA-older-systems.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":26706,"url":"http:\/\/www.computeradvantage.us\/v3\/how-to-unlock-your-mac-with-a-wave-of-your-hand-well-apple-watch\/","url_meta":{"origin":27460,"position":5},"title":"How to Unlock Your Mac with a Wave of Your Hand (well, Apple Watch)","author":"computeradv","date":"June 20, 2017","format":false,"excerpt":"It\u2019s magic. You walk up to your Mac, touch a key to wake it up, and upon noticing that you\u2019re wearing your Apple Watch, it unlocks without making you enter a password. Brilliant! For some of us, it\u2019s almost a reason alone to get an Apple Watch. Auto Unlock, as\u2026","rel":"","context":"In &quot;Apple Watch&quot;","block_context":{"text":"Apple Watch","link":"http:\/\/www.computeradvantage.us\/v3\/category\/apple-watch\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/Auto-Unlock-Security-pref-pane-1024x833.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/Auto-Unlock-Security-pref-pane-1024x833.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/Auto-Unlock-Security-pref-pane-1024x833.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/06\/Auto-Unlock-Security-pref-pane-1024x833.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts\/27460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/comments?post=27460"}],"version-history":[{"count":0,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts\/27460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/media\/27461"}],"wp:attachment":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/media?parent=27460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/categories?post=27460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/tags?post=27460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}