Creating Strong Passwords

The easiest way for someone to access your personal information is by guessing or stealing your passwords, so make them as strong as possible and keep them secure.

Colonial First produced this article which produces some great insights into creating strong passwords.

Tips to keep you and your family safe from cybercrime.

The easiest way for someone to access your personal information is by guessing or stealing your passwords, so make them as strong as possible and keep them secure.

Identity theft occurs when someone uses your personal information to pretend to be you in order to carry out fraudulent activities, such as trying to access your bank accounts or opening a credit card in your name.

Cybercrime campaigns often start with an email that attempts to convince you to install unauthorised software on their computer, or asks them to provide personal information. This can result in financial loss or other negative consequences. The good news is there are easy steps you can take to keep yourself and your family safe online. By understanding more about cybercrime and how cybercriminals target their victims, you can learn to recognise potential scams and adopt safe online behaviour.

WHAT MAKES A STRONG PASSWORD?

  • Long – If it is more than eight characters, it will be harder to guess
  • Complex – Made up of a mix of letters, numbers and symbols
  • Unique – Use different passwords for different websites and online services
  • Random – Avoid using common words that you could find in a dictionary
  • Easy to remember – Create a password based on a phrase that is easy for you to remember, but hard for anyone else (especially a computer) to guess
  • Difficult to guess – Don’t use obvious names, dates of birth, sequences or phone numbers

PASSWORDS CHECKLIST

    1. Don’t write your passwords down or store them on your computer. If you must record it somewhere, make sure it’s disguised.
    2. Never share your password with anyone, even family members.
    3. Don’t click ‘remember this password’ on your browser, and make sure you log off when you’re finished.
    4. Use a password manager such as ‘KeePass’, ‘LastPass’, ‘Dashlane’ or ‘1Password’ if you have trouble memorising complex passwords.
    5. If you think your login details to a secure site have been lost or stolen, alert the company immediately.

TYPES OF CYBERCRIME

Online scams

Schemes that seek to take advantage of individuals by presenting a solicitous offer (such as a free or cheap holiday) that turns out to be dishonest or non-existent.

Identity fraud

Illegally accessing an individual’s information and using this information to steal money or other benefits.

Malware & ransomware

Malicious software designed to gain unauthorised access to an individual’s computer system. Typically used to steal data, destroy data, or to prevent the user from being able to access their files, holding them to ‘ransom’ and extorting users for payment.

Phishing

An email pretending to be from a legitimate, trusted company (such as a bank or other service provider) that attempts to trick an individual into providing their personal or financial information.

Important:

This article was produced by Colonial First State 15 October 2018.  This is a link to the original article.

This provides general information and hasn’t taken your circumstances into account. It’s important to consider your particular circumstances before deciding what’s right for you. Any information provided by the author detailed above is separate and external to our business and our Licensee. Any information provided by the author detailed above is separate and external to our business and our Licensee. Neither our business, nor our Licensee take any responsibility for any action or any service provided by the author.

Any links have been provided with permission for information purposes only and will take you to external websites, which are not connected to our company in any way. Note: Our company does not endorse and is not responsible for the accuracy of the contents/information contained within the linked site(s) accessible from this page.

Share this:

Disclaimer: The information contained in this document is based on information believed to be accurate and reliable at the time of publication. Any illustrations of past performance do not imply similar performance in the future. To the extent permissible by law, neither we nor any of our related entities, employees, or directors gives any representation or warranty as to the reliability, accuracy or completeness of the information; or accepts any responsibility for any person acting, or refraining from acting, on the basis of information contained in this newsletter. This information is of a general nature only. It is not intended as personal advice or as an investment recommendation, and does not take into account the particular investment objectives, financial situation and needs of a particular investor. Before making an investment decision you should read the product disclosure statement of any financial product referred to in this newsletter and speak with your financial planner to assess whether the advice is appropriate to your particular investment objectives, financial situation and needs.