{"id":269616,"date":"2024-04-12T08:45:37","date_gmt":"2024-04-12T08:45:37","guid":{"rendered":"https:\/\/cloudshepherd.co.uk\/?p=269616"},"modified":"2024-04-12T13:59:17","modified_gmt":"2024-04-12T13:59:17","slug":"world-password-day","status":"publish","type":"post","link":"https:\/\/cloudshepherd.co.uk\/index.php\/2024\/04\/12\/world-password-day\/","title":{"rendered":"World Password Day!"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;1px|auto||auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><\/h2>\n<h2>Celebrating World Password Day: Your Guide to Unbreakable Password Practices<\/h2>\n<p><span>Happy World Password Day from all of us at CloudShepherd Limited! Today marks a special occasion dedicated to bolstering our defences in the ever-evolving digital landscape. Initiated by Intel in 2013 and celebrated every first Thursday of May, World Password Day serves as a timely reminder of the critical role robust password practices play in safeguarding our digital identities\u2014whether you\u2019re a solo adventurer in the digital realm or part of a colossal enterprise.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>The Ripple Effects of Weak Passwords<\/h2>\n<p>The essence of World Password Day lies in recognising that a single compromised password can unleash a domino effect of security breaches throughout an organization. Consider this\u201454% of employees reuse their passwords across multiple platforms. If a hacker cracks just one password, they might gain the keys to multiple other critical systems.<\/p>\n<p>Data breaches stemming from such compromises are costly affairs, with an average hit of $4.5 million, as per the IBM Security Cost of a Data Breach Report 2023. Moreover, these breaches are amongst the most prolonged to rectify, taking months to detect and contain.<\/p>\n<h2><\/h2>\n<h2><\/h2>\n<h2>Elevating Password Security in Your Organisation<\/h2>\n<p>World Password Day is the perfect juncture to engage with your team about stepping up their password game. Here\u2019s how you can tighten the bolts:<\/p>\n<ul>\n<li><strong>Implement Stringent Password Policies:<\/strong> No reusing old passwords, mandate frequent updates, and set requirements for complex passwords that include a blend of upper and lower case letters, numbers, and symbols.<\/li>\n<li><strong>Promote the Use of a Password Manager:<\/strong> Simplify password management without sacrificing security by adopting robust password managers that can generate and safely store complex passwords.<\/li>\n<li><strong>Advocate for Multi-Factor Authentication (MFA):<\/strong> Add an extra layer of security by enabling MFA. Encourage the use of authenticator apps over SMS-based verification to enhance security protocols.<\/li>\n<\/ul>\n<h2><\/h2>\n<h2>Why Robust Password Hygiene Should Be Everyone&#8217;s Business<\/h2>\n<p><span>It&#8217;s a common m<em>y<\/em>th that cyber criminals only target the big players, leaving smaller entities under the radar. Likewise, individuals in large corporations might think, \u201cI\u2019m just one among thousands\u2014surely, I\u2019m not at risk?\u201d These assumptions are dangerously misleading and expose businesses to significant cyber threats.<\/span><\/p>\n<p>Our insights, backed by findings from the 2023 FBI IC3 Report, highlight that credential phishing tops the chart for cybercrimes affecting all scales and sectors of business. What\u2019s more, attackers are not just after the big fish; anyone within an organization, especially those handling sensitive roles in finance and HR, is a prime target.<\/p>\n<p><span><\/span><\/p>\n<p><span><\/span><\/p>\n<h2><\/h2>\n<h2>Understanding the Importance of Password Safety<\/h2>\n<p><span>In our increasingly digital world, the significance of maintaining robust password hygiene cannot be overstated. Passwords act as the first line of defense against unauthorized access to your personal and business accounts. As we approach World Password Day on May 2nd, it&#8217;s a perfect time to reassess our password practices and ensure we&#8217;re doing all we can to safeguard our digital lives.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Tips for Creating Memorable, Secure Passwords<\/h2>\n<div>\n<p>Creating a password that is both secure and easy to remember might seem challenging, but it&#8217;s achievable with the right approach:<\/p>\n<p><strong style=\"font-size: 14px;\">Use a passphrase:<\/strong><span style=\"font-size: 14px;\"> Consider a sequence of words or a sentence that you can easily recall. For example, &#8220;My dog barks at 2 cats!&#8221; has high entropy due to its length and mix of characters.<\/span><\/p>\n<p><strong style=\"font-size: 14px;\">Incorporate personal touches:<\/strong><span style=\"font-size: 14px;\"> Customize your passphrase with details meaningful only to you, making it less guessable. For example, &#8220;BlueHouse52#Road!&#8221; could represent a personal memory or favorite place.<\/span><\/p>\n<p><strong style=\"font-size: 14px;\">Employ mnemonic devices:<\/strong><span style=\"font-size: 14px;\"> Create passwords using the first letters of each word in a phrase or song lyric you enjoy. For example, the phrase &#8220;I love two things: chocolate and vacations!&#8221; can be turned into &#8220;10Chocolatevacaction?&#8221;<\/span><\/p>\n<p><strong style=\"font-size: 14px;\">Add complexity subtly:<\/strong><span style=\"font-size: 14px;\"> You can increase entropy by changing letters to numbers or symbols that still make sense to you, such as replacing &#8216;E&#8217; with &#8216;3&#8217; or &#8216;S&#8217; with &#8216;$&#8217;.<\/span><\/p>\n<p><strong style=\"font-size: 14px;\">Use a password manager:<\/strong><span style=\"font-size: 14px;\"> To keep track of your different high-entropy passwords, consider using a password manager. These tools can also generate strong passwords for you and securely store them, modern browsers such as Edge have built in functions for storing password and password generation which really takes away from the hassle of this.<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>The Role of Regular Updates and Unique Passwords<\/h2>\n<div><span>It\u2019s crucial to not reuse passwords across multiple sites. If one site experiences a security breach, all accounts using the same password could be compromised. Regularly updating your passwords and ensuring each account has a unique password diminishes the risk of unauthorized access.<\/span><\/div>\n<div><span><\/span><\/div>\n<div><span><\/span><\/div>\n<p>&nbsp;<\/p>\n<h2>What is Password Entropy?<\/h2>\n<p>I thought i&#8217;d leave the funnest part till last, one of the most important things to rememeber is entropy this is the calucation of how secure your password is, the formula is <span class=\"base\"><span class=\"mord mathnormal\">H<\/span><span class=\"mspace\"><\/span><span class=\"mrel\">=<\/span><span class=\"mspace\"><\/span><\/span><span class=\"base\"><span class=\"strut\"><\/span><span class=\"mord mathnormal\">L<\/span><span class=\"mspace\"><\/span><span class=\"mbin\">\u00d7<\/span><span class=\"mspace\"><\/span><\/span><span class=\"base\"><span class=\"strut\"><\/span><span class=\"mop\">lo<span>g<\/span><span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist\"><span><span class=\"pstrut\"><\/span><span class=\"sizing reset-size6 size3 mtight\"><span class=\"mord mtight\">2<\/span><\/span><\/span><\/span><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><span><\/span><\/span><\/span><\/span><\/span><\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">N<\/span><span class=\"mclose\">) looks scary but it isn&#8217;t<\/span><\/span><\/p>\n<p><span class=\"base\"><span class=\"mclose\"><\/span><\/span><\/p>\n<ul>\n<li><span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">L<\/span><\/span><\/span><\/span><\/span> is the length of the password.<\/li>\n<li>\n<p><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">N<\/span><\/span><\/span> is the number of possible symbols for each character in the password.<\/p>\n<\/li>\n<li>\n<p><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">H<\/span><\/span><\/span><span> is the entropy, measured in bits.<\/span><\/p>\n<\/li>\n<\/ul>\n<p>log2(N) gives the number of bits necessary to represent N different symbols, and multiplying this by the length L of the password gives the total entropy of the password in bits.<span><\/span><\/p>\n<p><span>Let&#8217;s say you have a password with 12 characters that can include lowercase, uppercase, digits, and 10 special characters (total 72 possible characters). The entropy calculation would be:<\/span><\/p>\n<ul>\n<li>Calculate<span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-mathml\"> <\/span><\/span><\/span><\/span><\/span><\/span><\/span><span class=\"base\"><span class=\"mord mathnormal\">N<\/span><\/span><span style=\"font-size: 14px;\"> (total possible characters): 72<\/span><\/li>\n<li>Compute <span class=\"base\"><span class=\"mop\">log<span class=\"msupsub\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist\"><span class=\"pstrut\"><\/span><span class=\"sizing reset-size6 size3 mtight\"><span class=\"mord mtight\">2<\/span><\/span><\/span><span class=\"vlist-s\">\u200b<\/span><\/span><span class=\"vlist-r\"><span class=\"vlist\"><\/span><\/span><\/span><\/span><\/span><span class=\"mopen\">(<\/span><span class=\"mord\">72<\/span><span class=\"mclose\">)<\/span><\/span><span style=\"font-size: 14px;\"> to find the entropy contribution per character.<\/span><\/li>\n<li>Multiply by the length L <span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-mathml\">of the password<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<p>Therefore, the total entropy for this 12-character password would be about 74.04 bits.<span style=\"font-size: 14px;\">\u00a0<\/span><\/p>\n<p>Heres a little cartoon to make explain<\/p>\n<div><\/div>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/cloudshepherd.co.uk\/wp-content\/uploads\/2024\/04\/password_strength_2x-e1712910388736.png&#8221; title_text=&#8221;password_strength_2x&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|||3px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;4px|||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><\/h2>\n<h2><\/h2>\n<h2><\/h2>\n<h2>What&#8217;s the take home?<\/h2>\n<p>To boil it down to the simplest form:<\/p>\n<p>1. Make your passwords as long as possible<br \/>2. Make sure you use different password for each of your accounts<br \/>3. Use MFA where ever possible<\/p>\n<p>Happy password day everyone from Cloud Shepherd!!<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;Test Drive our Products Today&#8221; button_text=&#8221;Click Here&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>As a specialist in cloud computing and secure connectivity, we are experts in creating the right remote working environment to connect your people and deliver results.<span style=\"font-size: 14px;\">\u00a0<\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/cloudshepherd.co.uk\/index.php\/cloud-managed-desktop\/&#8221; button_text=&#8221;Cloud Desktop Test Drive&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/cloudshepherd.co.uk\/index.php\/voice-over-cloud\/&#8221; button_text=&#8221;Cloud Voice Test Drive&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Celebrating World Password Day: Your Guide to Unbreakable Password Practices Happy World Password Day from all of us at CloudShepherd Limited! Today marks a special occasion dedicated to bolstering our defences in the ever-evolving digital landscape. Initiated by Intel in 2013 and celebrated every first Thursday of May, World Password Day serves as a timely [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":269619,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[18],"tags":[],"class_list":["post-269616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/269616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=269616"}],"version-history":[{"count":7,"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/269616\/revisions"}],"predecessor-version":[{"id":269627,"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/269616\/revisions\/269627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/media\/269619"}],"wp:attachment":[{"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=269616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=269616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudshepherd.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=269616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}