{"id":12568,"date":"2021-09-03T17:29:05","date_gmt":"2021-09-03T15:29:05","guid":{"rendered":"https:\/\/www.webafrica.co.za\/blog\/?p=12568"},"modified":"2021-11-05T16:23:45","modified_gmt":"2021-11-05T14:23:45","slug":"how-safe-are-your-online-passwords","status":"publish","type":"post","link":"https:\/\/blog.webafrica.co.za\/blog\/general\/how-safe-are-your-online-passwords\/","title":{"rendered":"How safe are your online passwords?"},"content":{"rendered":"\n<p>If you\u2019ve watched <em>Mr. Robot<\/em> (streaming on Netflix at the moment) or any other series\/movie about hacking, you\u2019re probably already pretty paranoid about cybersecurity. And for good reason.<\/p>\n\n\n\n<p>With technology continuously advancing, it has become easier for hackers to exploit users and use data to their advantage. Most of us who are on social media have probably seen friend&#8217;s accounts being hacked with attackers posting explicit or other unwanted content on a friend\u2019s profile. It seems small but could potentially lead to more serious hacks. Here is a little bit more about cybersecurity threats\u2026<\/p>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\" style=\"font-size:43px\">Hacking Methods<\/p>\n\n\n\n<p>The most common types that are used on everyday people like me and you are phishing, credential stuffing and password spraying. These could be carried out by any hacker, whether you know them or not.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phishing<\/strong><\/h2>\n\n\n\n<p>Most of us are familiar with the term as it has become very popular and is an easier way for a hacker to get to your information. Phishing is when the hacker \u201ctricks\u201d you into giving up your details. The attacker usually uses something like an email prompting you to click on a link and takes you to a cloned site where you then enter your details thinking you are on the true site. Many banks are targeted like this (yes, in South Africa too) which is obviously a serious problem.<\/p>\n\n\n\n<p>To stay safe, make sure that you recognise the link you are on \u2013 so for the Webafrica Customer Zone, for example, you can ensure it\u2019s always: <a href=\"https:\/\/webafrica.co.za\/clientarea.php\">https:\/\/webafrica.co.za\/clientarea.php<\/a> It\u2019s very important to rather go straight to a site you know is legitimate by typing the true site\u2019s URL straight into the web address bar. <\/p>\n\n\n\n<p>Always check the sender\u2019s email address and if it looks strange, try to Google it first and check if there are any scam reports for it. Don\u2019t open attachments if you\u2019re not sure the email is legitimate. A dead giveaway usually is that the emails and cloned sites will typically contain spelling and grammar mistakes. Usually, hackers are working fast and not all are English-speaking, so you\u2019ll probably notice a few strange typos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Password Spraying<\/strong><\/h2>\n\n\n\n<p>The hacker uses a list of commonly used passwords against various usernames until he finds a match between a password and a username. It\u2019s a bit like the wheel of fortune \u2013 spin it until you win it. Well, in this case, the hacker would be the winner sadly. The best way to not get caught by a password sprayer is to use a password manager with randomly selected passwords that mean nothing at all. It relies on bad password habits. Spraying is a lot more specific in the attack as they will typically only attempt passwords four times to avoid an account being locked (in the event of a lock-out account system where you can only enter the password incorrectly five times).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Credential Stuffing<\/strong><\/h2>\n\n\n\n<p>Like Password Spraying, this is a bit of a roulette game. The difference here is that they use details that they have already stolen and start testing it against other sites. So after a data breach, there will be a list of email addresses, usernames and passwords which they will then use to try to log into other sites. It works on the idea that people reuse passwords on different sites. This is where it becomes important to always have unique passwords for every account you create. <\/p>\n\n\n\n<p>If you want to see if your passwords have been compromised you can sign up for a website like <a href=\"https:\/\/haveibeenpwned.com\/\">Have I been pwned<\/a> where you enter your email address and they give you all the sites that have been breached.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Other<\/strong><\/h2>\n\n\n\n<p>Other hacking methods are a bit more personal. We won\u2019t go into it too much as the chances are lower for you to be hacked in these ways, but here\u2019s a quick rundown:<\/p>\n\n\n\n<p><strong>Keylogging:<\/strong> Here the hacker knows the victim either personally or has an interest in the victim (political figures, corporate\/state espionage for example). This will require the hacker to gain access to the victim\u2019s device\/machine to install malware. Your password strength won\u2019t matter much here. Your only defence will be a good endpoint security system.<\/p>\n\n\n\n<p><strong>Brute Force:<\/strong> This you will probably see in many movies. Credential stuffing and password spraying are versions of brute force attacks with a common underlying theme: trial and error. It\u2019s where the hacker runs an algorithm against encrypted passwords. Password length is your best bet if you\u2019re scared of these more forceful attacks. Keep it above 16 characters and use capital letters, special characters and numbers somewhere.<\/p>\n\n\n\n<p><strong>Local Discovery:<\/strong> This is basically when a friend, colleague, acquaintance or relative finds out your password \u2013 maybe you wrote it down somewhere \u2013 and uses it to log into your account without your knowledge.<\/p>\n\n\n\n<p><strong>Extortion:<\/strong> This is exactly what the name suggests. A hacker will blackmail you for your login details with reasons and demands depending on your relationship with the person.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"512\" src=\"https:\/\/www.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/Cybersecurity-Don-t-be-the-slowest-antelope-on-the-Serengeti.jpg\" alt=\"\" class=\"wp-image-12576\" srcset=\"https:\/\/blog.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/Cybersecurity-Don-t-be-the-slowest-antelope-on-the-Serengeti.jpg 683w, https:\/\/blog.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/Cybersecurity-Don-t-be-the-slowest-antelope-on-the-Serengeti-500x375.jpg 500w, https:\/\/blog.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/Cybersecurity-Don-t-be-the-slowest-antelope-on-the-Serengeti-613x460.jpg 613w, https:\/\/blog.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/Cybersecurity-Don-t-be-the-slowest-antelope-on-the-Serengeti-400x300.jpg 400w, https:\/\/blog.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/Cybersecurity-Don-t-be-the-slowest-antelope-on-the-Serengeti-60x45.jpg 60w, https:\/\/blog.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/Cybersecurity-Don-t-be-the-slowest-antelope-on-the-Serengeti-680x510.jpg 680w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\" style=\"font-size:43px\">Precautions You Can Take:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The most obvious precaution: don\u2019t write down your password where someone can find it.<\/li><li>Use two-factor authentication if it\u2019s available. Not all sites have it available yet but if you do, it\u2019s definitely a good thing to have. WhatsApp also recently introduced it, which we recommend you activate as WhatsApp hacking have become a popular new trend.<\/li><li>Don\u2019t ever use a password that means something to you like your maiden name, a birth date, your child\u2019s name, etc. And never, ever, ever use something like \u201cPassword1\u201d or \u201c1234\u201d or \u201cQWERTY\u201d \u2013 those are way too easy to hack. <a href=\"https:\/\/www.passwordrandom.com\/most-popular-passwords\">Here are the most popular passwords to definitely stay away from.<\/a><\/li><li>Use a password manager to randomly select passwords and store it for you \u2013 this will also help you to not reuse passwords and make you vulnerable to repeat attacks and credential stuffing.<\/li><\/ul>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\" style=\"font-size:43px\">Password Managers<\/p>\n\n\n\n<p>We strongly recommend you use a password manager for your login details. These managers help you to keep all your passwords safe in one place with no need to worry about remembering them. Not only can (most of) these password managers generate passwords, store your passwords and auto-fill for you on multiple devices, they can also do dark web monitoring for breached passwords.<\/p>\n\n\n\n<p>These are some that you could make use of:<\/p>\n\n\n\n<p><a href=\"https:\/\/1password.com\/\">1Password:<\/a> One of the more popular password managers out there. Get a 14-day free trial and thereafter pay $2.99 (roughly R53) per month which will be billed annually or for a family of up to five, $4.99 per month. It\u2019s a user-friendly application without complicated technical language and includes advanced security that will make you feel much safer.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lastpass.com\/\">LastPass:<\/a> This password manager is known for its simplicity and ease of use. The best part of LastPass is that you can get it for free for one person\/one device. You will still get a 30-day trial of Premium so you can get a taste of the advanced features. If you decide to upgrade your subscription, it will come at a price of $3 per month, billed annually. On Premium you can add an unlimited number of devices and on the Family plan ($4 per month) you can have unlimited devices for up to six users.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.keepersecurity.com\/remote-business-password-manager.html\">Keeper:<\/a> With a very high customer satisfaction rate, Keeper is a very trusted source out there. They have various payment plans that you can choose from; Student, Family, Personal, Business and Enterprise. It comes to only $2.91 per month ($34.99 billed annually) for the Personal standard package.<\/p>\n\n\n\n<p><a href=\"https:\/\/nordpass.com\/\">NordPass<\/a>: There are two options, a Personal Plan or a Business Plan. They are a bit cheaper than 1Password if you opt for a one-year plan at $1.99 per month working out to about $23.99 for the year. If you\u2019re not ready to commit to a year, you can opt for a month-to-month basis at $4.99 each month.<\/p>\n\n\n\n<p><a href=\"https:\/\/bitwarden.com\/products\/\">Bitwarden:<\/a> This is considered one of the best free password managers out there by a variety of sources. It can be used across an unlimited number of devices (unlike many other free versions). If you don\u2019t want to pay for your password protection, this is the next best thing you can get. You can also add additional features if you\u2019d like through a Premium subscription at $10 per year (one of the cheaper options out there coming in at less than $1 a month) or the Family plan for only $3.33 per month. There\u2019s also Bitwarden for Business starting at $3 per month per user, should you want to get it for your business.<\/p>\n\n\n\n<p>If you want to do some more research on the subject and weigh the pros and cons, we found <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-password-managers\">this PC Mag article<\/a> to be very helpful in the ratings and they provide a section where you can compare specs as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve watched Mr. Robot (streaming on Netflix at the moment) or any other series\/movie about hacking, you\u2019re probably already pretty paranoid about cybersecurity. And for good reason. With technology continuously advancing, it has become easier for hackers to exploit users and use data to their advantage. Most of us who are on social media [&hellip;]<\/p>\n","protected":false},"author":69,"featured_media":12577,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[586,855,852,848,267],"class_list":["post-12568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-online-security","tag-password-protection","tag-phishing","tag-security","tag-webafrica"],"jetpack_featured_media_url":"https:\/\/blog.webafrica.co.za\/blog\/wp-content\/uploads\/2021\/09\/210708-F-XX111-1000.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pdAWxt-3gI","_links":{"self":[{"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/posts\/12568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/users\/69"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/comments?post=12568"}],"version-history":[{"count":17,"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/posts\/12568\/revisions"}],"predecessor-version":[{"id":12594,"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/posts\/12568\/revisions\/12594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/media\/12577"}],"wp:attachment":[{"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/media?parent=12568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/categories?post=12568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webafrica.co.za\/blog\/wp-json\/wp\/v2\/tags?post=12568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}