Patricia Marro
Sales and Marketing VP
Destroying the Myths About Password Security

Forgot Password? Me too. We all do it. It may have something to do with our undying need to have 700 hundred passwords for each and every login on the face of the world wide web. It’s nearly impossible to remember all of them. In terms of protection however, everyone and their mom ends up using a variation of the same password with a 1,2,3,4 at the end of it for a bit of character and jaded security.

We as users fear that our accounts are somehow more “hackible” if we choose the same password for every platform  we use. In reality, the level of hackability has more to do with the complexity of the password than having completely different passwords for all of your online portals. If you use the standard 5,6,7,8 sequence in your password, you will be much more prone to being hacked than if you had a complex password like: &%!@mX287294!!QzL0L.

Here’s the truth:

As soon as hackers gain access to systems, they may gain access to passwords. In most of cases, they DO NOT. Systems have one way of password encoding, and that’s through algorithms. The fact of the matter is, you cannot decode passwords once they’ve been encoded. When you type the password, the algorithm will encode the password and retrieve a number based on it. This number CANNOT be deciphered back into text.

Every time a hacker attempts to crack your code, they have to weave through an enormous database of stored password combinations. So when Joe-Schmo-The-Computer-Hacker is brute forcing his way through a black market database of a million passwords that the Hack World has accumulated, the odds are against him! This why we add our lovely random numbers or symbols at the end of your password to break the odds.

When you reset your passwords, a system suggests straight forward, normal combinations it believes to be secure. Those advisements protect you by using the reverse logic of hackers.

When hackers exhaust all of their options, they begin using logical sequences like: a, aa, aaa, aaaa, ab, ab, aba, abaa, aaba, aaab etc to crack passwords. Obviously, this is time consuming. So, if your policy is to lock the system for, let’s say 15 minutes after 3 unsuccessful attempts, a hacker’s dirty work becomes practically impossible.



Leave a reply

Name (required)
Email (will not be published) (required)

Number from the image above
Latest blog posts
VNX Versions
Subscribe to the blog by e-mail

Sign up to receive
Digital Edge blog by e-mail

Subscribe    Unsubscribe