{"id":4071,"date":"2012-06-08T06:17:17","date_gmt":"2012-06-08T11:17:17","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=4071"},"modified":"2012-06-08T06:17:17","modified_gmt":"2012-06-08T11:17:17","slug":"how-secure-are-your-passwords","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2012\/06\/how-secure-are-your-passwords\/","title":{"rendered":"How secure are your passwords?"},"content":{"rendered":"

The recent theft of LinkedIn passwords has again reminded users and network security experts alike of the vulnerabilities and threats that exist online, and the need for both websites and their members to do their part to better protect their data.<\/em><\/p>\n

\"\"<\/a>Over the last few days there have been widespread reports that over 6.4 million passwords for the professional networking site, LinkedIn<\/a>, have been compromised. Furthermore, a file allegedly containing the encrypted passwords has been posted online, with hackers and other interests working to decode them.\u00a0 So far, it is unclear whether email addresses or other personal information were also stolen, but in statement released by LinkedIn on 6 June, it stated:<\/p>\n

\u2026 We are continuing to investigate this situation and here is what we are pursuing as far as next steps for the compromised accounts: Members that have accounts associated with the compromised passwords will notice that their LinkedIn account password is no longer valid. These members will also receive an email from LinkedIn with instructions on how to reset their passwords\u2026.<\/em> (Source: LinkedIn<\/a>)<\/p><\/blockquote>\n

This recent case of compromised passwords, while unpleasant, is becoming increasingly frequent. This week, at least two other high profile sites, eHarmony<\/a> (dating\/matchmaking) and Last.fm<\/a> (music), were also targeted. In the case of eHarmony, for example, security experts discovered scrambled files with passwords for at least 1.5 million online accounts. Again, a file containing those passwords has since been uploaded to other websites and hackers have been encouraged to crack them. However, a greater concern to many who are aware of this incident is the fact that eHarmony stores extensive and highly personal information about its members, which could make them subject to extortion and embarrassment (Source: Reuters<\/a>).<\/p>\n

Network security requires vigilance<\/h3>\n

Consistent with the views of the network security professionals,\u00a0from\u00a0Barbados<\/a>,\u00a0Jamaica<\/a>\u00a0and\u00a0Trinidad and Tobago<\/a>, who\u00a0we interviewed\u00a0during our Expert Insights series, network security requires vigilance<\/strong>. Threats are becoming more frequent and sophisticated; hence it is imperative that there is continuous assessment of the integrity of one\u2019s network. This vigilance should also be underpinned by appropriate software and equipment, along with a clear and coherent data protection framework.<\/p>\n

In that regard, it is instructive to note that LinkedIn, which has over 160 million registered users and made over USD\u00a0522\u00a0million in revenues (year ending 2011), was reportedly using a very weak password encryption system:<\/p>\n

The 6.5 million leaked passwords were posted Monday on a Russian online forum, camouflaged with a common cryptographic code called SHA-1 hash. It’s a format that’s considered weak if added precautions aren’t taken. Roughly half of the “hashed” passwords have already been decoded and posted online in human-readable text\u2026<\/em><\/p>\n

\u2026 LinkedIn was using an outdated form of cryptography to secure its users’ private information. The company should have known better than to guard its lists with just SHA-1, experts say.<\/em><\/p>\n

The problem with SHA-1 is that it translates the same text the same way each time. So if your password is “password” and your friend’s password is also “password,” they will be hashed exactly the same way. That makes reversing the process to uncover the original password significantly easier.<\/em> (Source: CNN Money<\/a>)<\/p><\/blockquote>\n

Since the incident, LinkedIn has enhanced its security and augmented its encryption systems (Source: LinkedIn<\/a>). However, it is important to emphasise that since no systems is infallible. The measures implemented will not completely eliminate the possibility of another theft, but user information may be less easily compromised and deciphered.<\/p>\n

Set strong passwords<\/h3>\n

While it is incumbent on websites to ensure that their networks are secure, website members and users must also ensure that they set strong passwords for their accounts. Admittedly, many of us are juggling numerous accounts, so it becomes important to select passwords that are still (relatively) easy to remember. However, Figure 1 shows the most popular passwords, based on the theft of nearly 200,000 passwords on Gawker<\/a> in December 2010.<\/p>\n

\"\"<\/a>

Figure 1: Most popular passwords based on a 188,279 leaked Gawker Media passwords (Source: Sophos)<\/p><\/div>\n

 <\/p>\n

How then can password be made more secure and less decipherable to hackers?<\/strong> To increase the strength of your passwords, consider the following tips as a starting point, along with the short video clip below:<\/p>\n

    \n
  • make your passwords at least<\/strong> than 8 characters long<\/li>\n
  • include a combination of numbers and upper and lower case letters<\/li>\n
  • do not use dictionary words, your personal information and obvious sequences, such as parts of the alphabet or numbers<\/li>\n
  • add complexity by incorporating and replacing letters in your starting word or phrase with special characters, such as punctuation and symbols (e.g., @, %, &,\u00a0 _, ?, $, etc. ) if allowed, and<\/li>\n
  • change your password frequently, e.g. once per quarter.<\/li>\n<\/ul>\n