More and more of the sensitive, valuable things in our life are guarded through password-protected online accounts — love letters, medical records, bank accounts and more. Web sites use login procedures to protect those valuable things. As long as someone can’t log into your account, they can’t read your email or transfer money out of your bank account. As we live our lives online, how should we protect our logins?
- Use random passwords, and use a different password for every site
- Use a password manager to make creating and remembering passwords easier
- Make your answers to security questions just as strong as your passwords
- Use “two-factor authentication” wherever you can
- Pay attention to the browser’s security signals, and be suspicious
It’s hard out there for a password
Most logins today are protected by a password. If an attacker can get your password, he can access your account and do anything you could do with that account. So when you ask how secure your account is, you’re really asking how safe your password is. And that means you have to think about all the different ways that an attacker could access your account’s password:
- Seeing you use it with an unencrypted website
- Guessing it
- Stealing a file that has your password in it
- Using password recovery to reset it
- Tricking you into giving it to them
To keep your login safe, you need to prevent as many of these as possible. Each risk has a different corresponding mitigation.
Look for the lock
It’s easy to prevent attackers from stealing your password when you log into an unencrypted website: Never type your password unless you see a lock icon in the URL bar, like this:
The lock means that the website you’re using is encrypted, so that even if someone is watching your browsing on the network (like another person on a public WiFi hotspot), they won’t be able to see your password. Browsers are starting to roll out features that warn you when you’re about to enter your password on an unencrypted site.
Your browser also helps keep you informed about how trustworthy sites are, to help keep you safe from phishing. On the one hand, when you try to visit a website that is known to be a phishing site, any major browser will display a full-screen warning — pay attention and don’t use that site!

On the other hand, when you’re talking to a site that has provided proof of its legal identity, the browser will show you that identity. So for example, when you go to download Firefox, you can know that you’re getting it from Mozilla.

In general, the best defense against phishing is to be suspicious of what you receive, whether it shows up in email, a text message or on the phone. Instead of taking action on what someone sent you, visit the site directly. If an email says you need to reset your Paypal password, don’t click the link. Type in paypal.com yourself. If the bank calls, call them back.
Strength in diversity
The secret to preventing guessing, theft or password reset is a whole lot of randomness. When attackers try to guess passwords, they usually do two things: 1) Use “dictionaries” — lists of common passwords that people use all the time, and 2) make some random guesses. The longer and more random your password is, the less likely that either of these guessing techniques will find it.
When an attacker steals the password database for a site that you use (like LinkedIn or Yahoo), there’s nothing you can do but change your password for that site. That’s bad, but the damage can be much worse if you’ve re-used that password with other websites — then the attacker can access your accounts on those sites as well. To keep the damage contained, always use different passwords for different websites. There are also sites like have i been pwned where you can subscribe to be notified if your account is in one of the password databases that has been stolen.
My mother’s maiden name is “Ff926AKa9j6Q”
Finally, most websites have a password recovery system that lets you recover your password if you’ve forgotten it. Usually these systems make you answer some “security questions” before you can reset your password. The answers to these questions need to be just as secret as your password. Otherwise, an attacker can guess the answers and set your password to something he knows.
Randomness can be a problem, since the security questions that sites often use are also things people tend to know about you, like your birthplace, your birthday, or your relatives’ names, or that can be gleaned from sources such as social media. The good news is that the website doesn’t care whether the answer is real or not — you can lie! But lie productively: Give answers to the security questions that are long and random, like your passwords.
Get help from a password manager
Now, all of this sounds pretty intimidating. The human mind isn’t good at coming up with long sequences of random letters, let alone remembering them. You can use a password manager like 1Password, LastPass, or Dashlane to help improve your password hygiene. They will generate strong passwords for you, remember them for you, and fill them into websites so you don’t have type them in.
You do take on some risk by using one of these password managers, since they create a database that has all your passwords in it. However, all reputable password managers encrypt their databases with a “master password.” The master password is safer from theft than normal passwords: Because it never gets sent to a server (just used on your computer to encrypt the database), an attacker has to break into your computer in particular, rather than a server where he can harvest millions of accounts. And because you only have to remember one master password, you can make it extra strong. So in general, it’s much more likely that you’ll have an account breached due to not using a password manager (e.g., a weak or re-used password) than that someone will both steal the your password manager’s database and guess the master password.
Even if you can’t figure out how to use a password manager, sometimes the simplest, least glamorous technology is also pretty secure:
Just keep your written passwords in a safe place!
More factors, fewer problems
The other major step you can take to protect your account is to add a “second factor” to the login process. In most cases, the second factor is tied to your phone, which means that even if an attacker has your password, they can’t log in to your account unless they also have your phone. (And vice versa — if your phone gets stolen, they can’t log in unless they get your password.)
In order to enable two-factor authentication (or “2FA”), you’ll need to associate your phone with your account on the website. Each website will provide instructions, but it usually involves either entering your phone number or scanning a barcode with a special app. Then, when you go to log in, the website will ask you for a code from your phone. If an attacker doesn’t have your phone, he can’t get the code, so he can’t log in.
![]() Set up a two factor authentication app. |
![]() Step 1. Generate authentication codes when you want to login. |
![]() Step 2. Enter the verification code to proceed with login. |
2FA provides much better security than passwords alone, but not every website supports it. You can find a list of websites that support 2FA at https://twofactorauth.org, as well as a list of sites that don’t support 2FA and ways you can ask them to add support.
Strong, diverse, and multi-factor
For better or worse, we’re going to be using passwords to protect our online accounts for the foreseeable future. Use passwords that are strong and different for each site, and use a password manager to help. Set long, random answers for security questions (even if they’re not the truth). And use two-factor authentication on any site that supports it.
Following these steps takes some discipline and will make it harder to log in sometimes. But in today’s Internet, where thousands of passwords are stolen every day and accounts are traded on the black market, it’s worth some inconvenience to keep your online life safe.




SP Kelly
wrote on
willemm
wrote on
matt
wrote on
Bill
wrote on
Karen
wrote on
jonathan
wrote on
Hef
wrote on
Ian
wrote on
Johann ‘Myrkraverk’ Oskarsson
wrote on
Matt
wrote on
Toni Pejić
wrote on
Rick
wrote on
kjjensd gkhl3f;wnrg2wejehr1ohiblbio1
wrote on
Smok Szwecji
wrote on
The guy who schooled Rick
wrote on
Ron Tavalaro
wrote on
T
wrote on
DEJEN
wrote on
Dana Troy
wrote on
Rahimpasha
wrote on
Fabricio C Zuardi
wrote on
TJH
wrote on
Henry
wrote on
ZyrtisK
wrote on
Paul Smith
wrote on
A.
wrote on
ragearainbow
wrote on
evilalpaca
wrote on
Malanos Cypher
wrote on
Jeff
wrote on
Barbara Stanley
wrote on
Sidney Pires
wrote on
Walt D
wrote on
Sondra Kinsey
wrote on
Ale
wrote on
Longwabo
wrote on
Ujarat Khan
wrote on
José Manuel Alarcón
wrote on
Phil M
wrote on
Gpod
wrote on
Casey Crockett
wrote on
Tim S
wrote on
diah prama
wrote on
Adi Sucipto
wrote on
Brenda C
wrote on
jim
wrote on
Gina
wrote on
snohomishc
wrote on
cameleon
wrote on
Ken
wrote on
April King
wrote on
Rob
wrote on
Niranjan Shanmuganathan
wrote on
CactusJack
wrote on
peter
wrote on
taseer
wrote on
Patrick Smith
wrote on
PN
wrote on
Buddhika
wrote on
Phil Cohn
wrote on
PN
wrote on
April King
wrote on
Bob T
wrote on
morteza
wrote on
ma. leona a. molon
wrote on
MikeOH
wrote on
widayat moko
wrote on
Peter Preston
wrote on
April King
wrote on
Bob T
wrote on
Sally G
wrote on
Jim R in Miami
wrote on
April King
wrote on
Guessit
wrote on
Jim R in Miami
wrote on
citizen
wrote on
Giorgio
wrote on
Rick
wrote on
siddaling ambasa
wrote on
adam
wrote on
Dean
wrote on
SyED
wrote on
Rick
wrote on
Rick
wrote on
Sbbb3
wrote on
Linda
wrote on
DAVID PINNOCK
wrote on
Emmett
wrote on
Dr Kurian P J
wrote on
RC Rountree Jr
wrote on
jonathan bucao
wrote on
Jesus
wrote on
Rick
wrote on
Somebody
wrote on
Rick
wrote on
nader
wrote on
Riley Smelley
wrote on
Rick
wrote on
Rich
wrote on
Scruffy
wrote on
Guessit
wrote on
Fritz Balke
wrote on
M.J. Kelly
wrote on
jim
wrote on
Fritz Balke
wrote on
legitimate man
wrote on
ArcAngel
wrote on
legitimate man
wrote on
April King
wrote on
Rick
wrote on
Marge
wrote on
Hugo Ay
wrote on
Doug
wrote on
Doll
wrote on
Van Luu
wrote on
AncientMariner
wrote on
April King
wrote on
Kjuagutt
wrote on
Frank L
wrote on
John
wrote on
Tech Blogger
wrote on
Step
wrote on
William K.
wrote on
Keo Vannak
wrote on
John
wrote on
Deana
wrote on
diahana
wrote on
Ancient Technogeek
wrote on
Rose
wrote on
Mike
wrote on
promytius
wrote on
April King
wrote on
Lori Morton
wrote on
Theyarewatchingus
wrote on
April King
wrote on
Khalida Mehmood
wrote on
Manuel Hernandez
wrote on
Tyson
wrote on
Keith
wrote on
Sandie
wrote on
Markus
wrote on
Wa, MN
wrote on
Geminate
wrote on
Chief Adam the Great X
wrote on
Rahimpasha
wrote on
MeSa Mike
wrote on
Leonard Latham
wrote on
Chris
wrote on
petar
wrote on
mehdi shahidi
wrote on
julie
wrote on
Shailendra kumar
wrote on
Tyson
wrote on
Phillip Birch
wrote on
Amir
wrote on
DNA
wrote on
Abhiram
wrote on
channing Webster
wrote on
Jo
wrote on
Kay
wrote on
PW helper
wrote on
tayler
wrote on
Ed Kidder
wrote on
Rob Cramer
wrote on
umesh prasad yadav
wrote on
SpongeBob Squarepants
wrote on
PRK
wrote on
Dimitris
wrote on
Akshay Jain
wrote on
LJ4m3s
wrote on
mstosyn
wrote on
Qadar Adeeb
wrote on
Pepe
wrote on
Dee
wrote on
j d
wrote on
Chris
wrote on
Demon, Speed.
wrote on
david
wrote on