How a password generator can help you create a strong password

Do a quick Google search for “password hacking software”, and you will be shocked (and maybe appalled) at how many people sell programs design to crack your passwords and hack your accounts. You’ll also find questions from people around the world asking, “what are the best ways to hack someone’s password?” These are the people you need to protect yourself against.

Here are the top cyber security factors to make a strong password and accessing your accounts:

Each password should be unique

This takes extra work on your part, for sure. But imagine what would happen if a hacker cracked just one of your passwords—a password that you use to access several different accounts. The hacker would now be free to sign in to any of the accounts using that password. Don’t make a hacker’s job any easier!

No names, please

Don’t use your name, first, last or middle, as your password. The three passwords that a hacker will try first is, “password”, “123456” and different combinations of your name. Same goes for the names of family members, pets, friends, etc. A lot of this information is easy for hackers to find and they won’t hesitate to use it against you.

No important numbers

As with names, you shouldn’t use any numbers in your passwords that are easily discovered by hackers, including your date of birth, social security number, phone number, zip code, or anything similar. If you have trouble staying away from names and important numbers, PasswordsGenerator.com has a secure password generator that will take the guesswork out of it for you.

Clean out your browsers

Turn off automatic passwords, auto login, and password storage on your web browsers (IE, Firefox, Chrome, etc.) Any password stored in this way can be hacked.

And clean out the cloud

Don’t store any important passwords in the cloud, for the same reason as #7. Online storage is easily hacked into.

Sharing is not caring

Don’t log in to important accounts on shared computers (your home family computer is fine, as long as you trust everyone at home). This includes library computers, shared office computers, etc. The same goes for public internet connections, like a public wifi hotspot at a coffee shop, web proxies, free VPN or Tor.