Cyber Hygiene
Why should you care about passwords?
Cyber Hygiene

March 30, 2023 · 3 min read

Why should you care about passwords?

Welcome to CyberHygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.

Subscribe now

1. How have passwords evolved over time?


No alt text provided for this image

2. What are the top threats to passwords?


  • Cybercriminals can use software to crack passwords by guessing combinations of characters until the correct password is found. This is why it’s important to use strong, complex passwords that are difficult to guess.

  • Phishing and social engineering attacks are designed to trick users into giving away their login credentials by imitating a legitimate website or service. Once the cyber criminal has obtained the username and password, they can use it to access the account. For example, they may pose as a tech support agent and ask for the user’s password to fix an issue.

  • Keylogging is a method of recording every keystroke on a computer, including passwords. Cybercriminals can use keylogging software to steal login credentials without the user’s knowledge.

  • When a company or service experiences a data breach, it can result in user login credentials being compromised. Cybercriminals can use these stolen passwords to access the affected accounts.

  • Brute force attacks involve using software to try every possible combination of characters until the correct password is found. This method is time-consuming but can be successful if the password is weak.


Read Now!


4. What to do if your password is compromised or stolen?


  • Change your password immediately

  • Check for any unauthorized activity

  • Update your other passwords

  • Enable two-factor authentication (2FA)

  • Monitor your credit reports

  • Consider using a credit monitoring service

  • Be cautious of phishing scams


5. What resources are available to help you handle better your passwords and online credentials?


1) Books


2) Courses


3) Certifications


4) Documents


5) Podcasts


No alt text provided for this image

Visit