Six best practices for creating secure passwords
1 June 2019
Smart Home Automation
Information Security
By Doros Hadjizenonos, regional director – SADC at Fortinet
On May 2, we celebrated World Passport Day. The goal is to promote better cybersecurity hygiene by upgrading easy-to-guess passwords or refreshing older passwords that may have been compromised through some data breach. Think of it as the cyber equivalent of testing and replacing the batteries in your car’s key remote.
Doros Hadjizenonos
According to the Verizon Data Breach Investigation Report, 81% of breaches leveraged either stolen and/or weak passwords. That problem is compounded because one of the biggest risks to data security is the reuse of passwords across accounts. If one of your accounts is compromised and your user name and password are posted on the dark web, cybercriminals who know how often passwords are reused will simply begin to plug that information into other possible accounts until they unlock one that uses the exact same credentials.
This is a common risk, as 83% of people have admitted to reusing passwords across multiple sites. Even if you think it is safe to reuse passwords on accounts that don’t house sensitive data – a breach there can be used as an entryway to move laterally across networks in search of critical business data or personally identifiable information (PII).
What constitutes a weak password?
Short, simple passwords take fewer resources for hackers to compromise. In fact, hackers maintain databases of the most common words, phrases, and number combinations that they can run your password through to find a quick match.
Some of the most common passwords are baseball and football team names, any variant of 123456789, and QWERTY. Avoid using common password themes when creating a passphrase, such as the following:
• Birthdays.
• Phone numbers.
• Names including movies and sports teams.
• Simple obfuscation of a common word (‘P@$$w0rd’).
How to minimise password-based cyber risk
When creating new accounts or updating well-used passwords, keep these six best practices in mind to minimise password-based cyber risk.
1. To add an extra layer of security, use multi-factor authentication wherever possible. This confirms your identity by utilising a combination of multiple different factors, such as something you know or something they have, such as a token generator on your smartphone.
2. Never repeat the same password for different accounts.
3. Change your passphrase at least every three months. This will lock out cybercriminals who may be using your account, protect you from brute force attacks, and remedy the issue caused by cybercriminals who purchase lists of usernames and passwords obtained through data breaches.
4. Ensure no one is watching as you enter passwords.
5. Be cautious when downloading files from the internet as they may contain key loggers as well as password grabber malware variants that will compromise your password. A good practice is to regularly scan for the presence of such malware.
6. Use a cloud-based password manager to enable you to create and store strong passphrases. This is especially important if you require strong passwords for dozens of accounts. Password management tools allow you to securely store an encrypted list of passwords in the cloud that can be accessed from any device. Not only will you only need to remember one password to access your password locker, the passwords you store there for your various accounts can be even stronger because you don’t have to remember them.
When it comes to password security, everyone has a role to play in the protection of PII and corporate data. IT teams and stakeholders should review the common risks of weak passwords with their organisations, as well as remind everyone of these best practices. This simple practice can help employees better protect their data, while minimising unintentional insider threats to the organisation.
Further reading:
Bringing fire safety closer to home
SafeQuip
Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.
Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.
Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.
Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa
Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.
Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.
Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions
Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”
Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies
Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.
Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.
Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.
Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON
Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.
Read more...