Eight characters created by numbers can be understood immediately, according to the computer company Hive Systems, 37 seconds last year. Every year, The company releases its passwordIt shows Time to hack the password Use the best hardware available to consumers.
Hive was performed with encrypted passwords with the method used on most websites. In this case, according to the data of previous violations, it was very widespread. But this encryption is not incorrect and can be understood using it Rug.
In general, Passwords are long and more complex, it takes more time to understand them: The most complex of eight characters is 164 years. On the other hand, passwords can be understood in two weeks.
It is to be focused Passwords proven by hive settings are also randomly formed. If the password has previously been stolen, it uses words from the dictionary or reused between the websites and the time to understand it Drastically decreases, The check is instant, as shown below.
New security measures are essentially necessary
If you want to check the strength of your passwords, website How safe is my password? (How safe is my password?), As the name mentions, Let’s say that you want to change it.
Although the longest passwords provide greater security, their administration may be a challenge, so password managers who safely store and protect login credentials are the most popular solution.
Besides, Password Administrator supports the use of a unique session And premises that control security expression in the event of a violation of data. Although the password is weak, websites usually have security functions to avoid the total power The limit of the number of efforts. Porters usually use an additional security layer, such as recognition of two factors to avoid fraud.
Before the passwords often switch, now Experts insist on creating strong and unique passwords and keeping them if they are not compromised. This approach is considered more effective than frequent changes, which can lead to the repetition of weak passwords and similar.
(TagstotRanslate) Data Protection (T) CyberSecurity (T) Cyber Attacks
Story Credit