Speak to an expert : Live Chat exa online chat

EXALogo colourExa News

World Password Day 2024

Yesterday (May 2nd 2024) marked the 11th World Password Day, so we’re taking the opportunity to talk about strong passwords and how they play a part in securing your online presence. As tends to be the case with computer security, the answer to “what constitutes a strong password” has changed over time – and beyond that, it’s now not the only consideration you need to make when securing accounts.

Threats to your online presence

Security is a cat-and-mouse game between those defending computer systems and those attacking them. In response to the the general public being more security-conscious than ever, malicious actors are using increasingly sophisticated methods to gain unauthorised access to online accounts and technical infrastructure.

Supply chain attacks, impersonating legal authorities and the commercialisation of hacking tools are just some of the emerging threats. Advances in artificial intelligence, especially large language models, are allowing attackers to perform phishing attacks that are more convincing and with much less effort.

Consumer-grade computer hardware is more powerful than ever, allowing attackers to crack passwords at home without breaking the bank. Those inclined to do so could even rent processing power on extremely high powered servers from one of the many public cloud providers.

Years of data breaches and poor password security have provided hackers with huge datasets of user credentials that can be used to speed up their password cracking attempts, or (as is the increasingly popular option) to perform password stuffing attacks.

This technique takes advantage of users re-using their passwords on multiple websites. A malicious actor works through a list of credentials and tries to use them to sign in to a given website. Although straight-forward, password stuffing has enabled a number of high-profile data breaches in recent years:

23andMe’s breach really demonstrated not just the ease with which cyber criminals can exploit weak passwords but also the severe and wide-reaching consequences of such breaches. Hackers gained access to 14 thousand accounts, allowing them to download the personal details and genetic backgrounds of 5.5 million people.

A weak password can have an affect beyond just the person that chose it – only a quarter of a percent of those with their data leaked had their account breached.

Picking strong passwords

In the past, you may have seen advice like “choose at least 8 characters”, “use a mix of numbers, lowercase and uppercase letters” or “don’t use the same password for Facebook as you do for your bank”.

Despite this, many users still pick extremely weak passwords and re-use them on multiple websites. Research by NordPass found that of the 200 most common passwords stolen in data breaches, most would likely take less than 1 second to crack.

Cracking a password basically involves guessing the combination of characters that make it up. The more guesses an attacker has to make before they’re correct, the stronger your password is. Therefore, the strongest way to create a password is to pick a long series of random characters. A password like this has no patterns (like words or phrases) that allows an attacker to guess it quickly. Make sure to use a unique password for each website or account you have!

You can visualise this with Bitwarden’s password strength checker – https://bitwarden.com/password-strength/. Look at how the time to crack the password goes up as the length increases:

Password
Time to crack
WW91IGZ
17 minutes
WW91IGZv
3 hours
WW91IGZvd
1 day
WW91IGZvdW
12 days
WW91IGZvdW5kIGFuIGVhc3RlciBlZ2chCg==
Centuries (ie, never!)

In a sense, strong passwords are really inconvenient for humans. We’ve all heard of the “password on a post-it on the monitor/keyboard” scenario – complex passwords will lead to sloppy security practises in absence of some way to manage them easily. Nobody can be expected to remember “48656c6C6f20616761696E21”. For this reason, we highly recommend adopting a password manager – they make managing your passwords an awful lot easier, and can generate extremely strong passwords for you.

Beyond passwords

Picking strong, unique passwords is an excellent start to securing your accounts. However, a good cyber security policy should account for more risks. What if, through no fault of your own, your password falls into an attacker’s hands? In other words – how do you defend against account compromise, even if someone else knows your password?

Multi-factor authentication (also known as MFA, 2FA, 2 factor, etc.) is the go-to method for staying secure in this scenario. When you use MFA, websites will impose a second step during the sign-in process that helps ensure you are the person signing into your account. For example, they’ll text or email you a code that must be entered into the login form, or they’ll require you to enter a code from an authenticator app (such as Google Authenticator or Microsoft Authenticator). You could also invest in a hardware authentication token – websites that support these will require you to have the device plugged into your PC before they will allow you to sign in. A hacker would have to know your password and steal the token from you before they could impersonate you – not likely!

Another way to ensure your accounts are secure is to sign up for a service that monitors the news for security incidents (like Have I Been Pwned? or Apple’s compromised password alerts) which can alert you if your email or password is compromised. This will help you find out if your password’s been leaked in a timely fashion – at which point you can change your password and stay safe using our guidance above.

We’ll be discussing online security in more depth over the coming weeks, so make sure to subscribe to our newsletter to ensure you don’t miss out!

Keep up to date with our news

Suggested Next Read

Related News Articles

ISPA Testing

The Exa Foundation

Contact us

Other

Contact us

Is DarkLight connectivity best suited to you?

Dark fibre is perfect if you are looking for a potentially limitless, ultrafast connection with complete flexibility and control.

If you fully rely on the internet, a dark fibre connection could be the best option for you.

Is Leased Line connectivity best suited to you?

Leased Lines are best suited to you if you have high bandwidth requirements and need a reliable, uncontended service.

It is ideal for you if you regularly carry out large uploads and downloads, use cloud based services and a VoIP telephone system as well as video conferencing, for everyday communication.

Is GPON connectivity best suited to you?

GPON is a great choice for you if you need gigabit speeds but don’t need them to be symmetrical. It is becoming more widely available across the UK but may not be immediately available to you yet.

Is Rural Fibre connectivity best suited to you?

If you want to make the move to full fibre, but are based in a rural area, this option is for you.

Is FTTP connectivity best suited to you?

If you have a number of users who use cloud-based applications to upload and download data on a daily basis, but don’t transfer large amounts of data, FTTP might be your best option.

Is Gfast connectivity best suited to you?

If your line cannot support a minimum of 100Mbps, this connection is not for you. Gfast must meet the speed as a minimum. 

If your line meets this need, and you’re looking for an ultrafast, consistent and reliable connection without the hassle and upheaval of construction work – this could be a good fit.

It’s worth noting that Gfast is a stop gap to FTTP, and is not a technology that is likely to be around for a long time.

Is FTTC connectivity best suited to you?

If you need more bandwidth but don’t really need a guaranteed speed, FTTC could be for you. It is widely available throughout the UK, making it suitable as a main connection. As this connection provides higher speeds than ADSL, it is also a good option for a back up to a leased line.

As with ADSL, once the PSTN is turned off in 2025/26, FTTC will become virtually obsolete and at the very least you will require FTTP to remain connected.

Sales

Sales

Office hours

Monday: 8:30am – 5pm
Tuesday: 8:30am – 5pm
Wednesday: 8:30am – 5pm
Thursday: 8:30am – 5pm
Friday: 8:30am – 5pm
Saturday: Closed
Sunday: Closed

Finance

Contact us

Office hours

Monday: 8am – 4pm
Tuesday: 8am – 4pm
Wednesday: 8am – 4pm
Thursday: 8am – 4pm
Friday: 8am – 4pm
Saturday: Closed
Sunday: Closed

Provisioning

Contact us

Office hours

Monday: 8am – 5pm
Tuesday: 8am – 5pm
Wednesday: 8am – 5pm
Thursday: 8am – 5pm
Friday: 8am – 5pm
Saturday: Closed
Sunday: Closed

Is DSL connectivity best suited to you?

DSL connections offer very limited bandwidth so it might be right for you if you typically use the internet for less data-intensive tasks. If you’re sending emails, browsing the web, downloading very small files and working with small amounts of data – you should be fine with DSL.

It is worth noting connections based on copper wire, like DSL, will be switched off in the UK by Openreach, with a phased approach due to begin at the end of 2025. If you don’t have a fibre connection at the moment, you’ll need to upgrade this as well as move to a VoIP telephone system.

Technical Support

Contact us

Office hours

Monday: 8am – 6pm
Tuesday: 8am – 6pm
Wednesday: 8am – 6pm
Thursday: 8am – 6pm
Friday: 8am – 6pm
Saturday: 10am – 4pm
Sunday: 10am – 4pm