Privacy and security
Making sense of fraud shame: it’s never your fault
Explore the emotional impacts of scams and strategies to cope.
Read articleAmanda Lee
Senior Program Manager, Tech for Good™ & TELUS Wise®
Did you know? According to Norton, 80% of confirmed data breaches are related to stolen, weak or reused passwords. In our current era of technology, the importance of strong passwords cannot be overstated. With the increasing number of online accounts and the sensitive information they hold, ensuring that your passwords are robust and secure is crucial.
Protection against cyber attacks: weak passwords are a major target for cybercriminals. Techniques such as brute force attacks, where hackers try numerous combinations to guess a password, can easily crack simple passwords. Strong passwords significantly reduce the risk of unauthorized access.
Safeguarding personal information: many online accounts contain sensitive personal information, from financial details to private communications. A compromised password can lead to identity theft, financial loss, and privacy breaches.
Preventing account hijacking: social media and email accounts are often targeted by hackers to spread malware or phishing scams. A strong password helps prevent such hijacking, protecting not only your account but also your contacts.
Compliance with security standards: many organizations and services require strong passwords to comply with security standards and regulations. Using strong passwords ensures you meet these requirements and maintain access to essential services.
Length and complexity: a strong password should be at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and special characters. The more complex the password, the harder it is to crack.
Avoid common words and patterns: refrain from using easily guessable information such as, password, your date of birth, family members or pet names. Avoid predictable patterns like qwerty or 123456.
Use passphrases: instead of a single word, consider using a passphrase—a sequence of random words or a sentence. For example, "Llamas&Flamingos!Dancing2024#" is both memorable and secure.
Incorporate unpredictability: use a combination of unrelated words, numbers, and symbols. For instance, "Goat!7$Skyline" is more secure than "MountainGoat123".
Avoid reusing passwords: each of your accounts should have a unique password. Reusing passwords across multiple accounts increases the risk of a domino effect if one account is compromised.
Use a password manager: password managers are tools that generate, store, and manage your passwords securely. They can create complex passwords for each account and store them in an encrypted database, accessible with a single master password. Ensure you choose a password manager from a reputable provider, such as TELUS Online Security.
Enable two-factor authentication (2FA): 2FA adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. This makes it significantly harder for attackers to gain access.
Regularly update passwords: periodically changing your passwords can help protect against potential breaches. Set reminders to update your passwords every few months.
Monitor for breaches: use services that alert you if your information appears in a data breach. If you receive such an alert, change your passwords immediately.
Be cautious with security questions: security questions can be a weak link if the answers are easily guessable or publicly available. Treat them like passwords—use complex, unpredictable answers.
Strong passwords are a fundamental aspect of online security. Remember, the effort you put into creating and managing strong passwords is a small price to pay for the peace of mind that comes with knowing your digital life is secure. To test your knowledge take this interactive quiz.
Explore the emotional impacts of scams and strategies to cope.
Read articleThe Canadian Anti-Fraud Centre highlights the most popular holiday frauds.
Read articleLearn how to spot sextortion scams, steps to take if targeted and proactive measures to protect yourself.
Read article