Wednesday, 07 July 2021 11:49

Passwords: Your first and often weakest defence

By Aaron Bugal
Aaron Bugal, Global Solutions Engineer, Sophos Aaron Bugal, Global Solutions Engineer, Sophos

Guest Opinion: Password security continues to be a challenge for people and businesses across the world, and in the wake of the Colonial Pipeline ransomware attack where a single password was the key to hackers breaching the entire network, businesses should assess their own password practices.

In a recent experiment by Sophos Labs, the cybersecurity team were able to guess, by hand, 17 of the top 20 passwords in Have I Been Pwned’s Pwned Passwords in under two minutes.

So, if you are trusting your personal security to be protected by ‘qwerty’ or ‘12345’, you are setting yourself up to be hacked.

However, even if you deploy a long and strong password with a combination of letters, numbers and special characters, your password still isn’t bulletproof. There are multiple ways cybercriminals can get hold of passwords without having to guess your dog’s name.

For example, some internet services still store plaintext passwords, whether due to bugs in their system or sloppy practices. Google and Twitter have both flagged this issue with users in recent years, and while plaintext data storage is now rare, it still occasionally happens. As a result, when hackers compromise one of these servers, they can access every user’s data with no decryption required.

Malware also plays a significant role in how hackers can steal passwords. If a server has been hacked, it could host memory-scalping malware, which can find raw passwords while they are being checked, even if the password never gets saved to the disk. Keylogging malware can also be downloaded to your device directly, which captures passwords and other sensitive data as you type them. This is why employing a strong antivirus solution is integral across personal and professional devices.

Once hackers have your password, it doesn’t matter how complex or long it is, they can access every other account that shares it. This process is known as credential stuffing. If a password works on one account, it costs a hacker almost no time or effort to try that same one on other accounts.

While using one password across all accounts will leave you vulnerable, using passwords that are obviously linked should also be avoided. If your Facebook password is ‘FBpassword123’, it isn’t a far reach that your Twitter password might be ‘TWpassword123’, making this strategy no safer from credential stuffing than using the same password for everything.

So, how can people and businesses protect their account logins effectively?

  • Don’t re-use passwords. Similarly, don’t use a template for your passwords that is modified slightly for each different account. Cybercriminals are on the lookout for this and will get around it.
  • Use a password manager. Password managers will generate random and unrelated passwords for each account, meaning even if one password is compromised, the rest of your accounts stay safe. Remember that you don’t have to put all your passwords into a manager app if you don’t want to: it’s okay to have a special way of dealing with your most important accounts, especially if you don’t use them often.
  • Turn on 2FA if you can. While two-factor authentication doesn’t guarantee your account’s safety, it stops criminals from carrying out attacks on a broad scale, as passwords alone won’t grant access.
  • Install antivirus protection on all your devices to protect yourself from malware. As well as antivirus software on your computer, you should also consider installing an antivirus app on your mobile device, such as Sophos Intercept X for Mobile. Make sure these apps are updated and run regular scans to protect your devices.
  • Report payment anomalies. Track your outgoing and incoming payments for irregularities, and report any errors as soon as possible, no matter how small the amount. Report errors as soon as you see them, even if you didn’t lose any money. The sooner you report it, the sooner you can secure your account.
Read 1011 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Thoughtworks presents XConf Australia, back in-person in three cities, bringing together people who care deeply about software and its impact on the world.

In its fifth year, XConf is our annual technology event created by technologists for technologists.

Participate in a robust agenda of talks as local thought leaders and Thoughtworks technologists share first-hand experiences and exchange new ways to empower teams, deliver quality software and drive innovation for responsible tech.

Explore how at Thoughtworks, we are making tech better, together.

Tickets are now available and all proceeds will be donated to Indigitek, a not-for-profit organisation that aims to create technology employment pathways for First Nations Peoples.

Click the button below to register and get your ticket for the Melbourne, Sydney or Brisbane event



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Share News tips for the iTWire Journalists? Your tip will be anonymous