{"id":2191,"date":"2013-07-31T16:35:54","date_gmt":"2013-07-31T16:35:54","guid":{"rendered":"http:\/\/2b3.analogman.org\/?p=2191"},"modified":"2015-02-06T20:42:53","modified_gmt":"2015-02-06T20:42:53","slug":"1-2-3-4-5-password-dos-and-donts","status":"publish","type":"post","link":"https:\/\/www.2bridgestech.com\/?p=2191","title":{"rendered":"1-2-3-4-5 Password Do\u2019s and Don\u2019ts"},"content":{"rendered":"<p>2bridges loves security.\u00a0 From bike chains, to combination lockers, to that little sealer thing on the top of ziplock bags.\u00a0 One of the first lines of defense in the digital world is knowing how to correctly select a password.\u00a0 Here are a few quick do\u2019s and don\u2019ts to keep in mind when trying to protect your personal information online:<\/p>\n<p><strong>Do<\/strong> use both upper and lower case letters.<\/p>\n<p><strong>Do<\/strong> include digits and\/or punctuation in addition to letters.<\/p>\n<p><strong>Do<\/strong> have your password use a minimum of twelve characters.<\/p>\n<p><strong>Do<\/strong> make your password easily memorized, so they do not have to be written down.<\/p>\n<p><strong>Do<\/strong> be able to type your password quickly, so no one else can memorize it when it\u2019s being entered.<\/p>\n<p><strong>Do<\/strong> store your passwords in an encrypted file or somewhere passing traffic cannot see.<\/p>\n<p><strong>Don\u2019t<\/strong> select your password to match your username. This is the most common mistake and the most easy to exploit. NEVER do it.<\/p>\n<p><strong>Don\u2019t<\/strong> use passwords that are named after yourself, family, pets or personal dates.<\/p>\n<p><strong>Don\u2019t<\/strong> use words that are in the dictionary. These are easy to crack using a \u201cbrute force\u201d technique.<\/p>\n<p><strong>Don\u2019t<\/strong> add a digit in front of or reverse a word (ex. \u201c1password\u201d or \u201cdrowssap\u201d).<\/p>\n<p><strong>Don\u2019t<\/strong> use the same password over and over.\u00a0 If a hacker should break one password, the rest of your files\u00a0 and information will still be safe.<\/p>\n<p><strong>Don\u2019t<\/strong> give your password to anyone else.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2bridges loves security.\u00a0 From bike chains, to combination lockers, to that little sealer thing on the top of ziplock bags.\u00a0 One of the first lines of defense in the digital world is knowing how to correctly select a password.\u00a0 Here are a few quick do\u2019s and don\u2019ts to keep in mind when trying to protect your personal information online: Do use both upper and lower case letters. Do include digits [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[195,190,192],"tags":[],"class_list":["post-2191","post","type-post","status-publish","format-standard","hentry","category-how-to","category-in-the-news","category-technology"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5AwLi-zl","_links":{"self":[{"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=\/wp\/v2\/posts\/2191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2191"}],"version-history":[{"count":1,"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=\/wp\/v2\/posts\/2191\/revisions"}],"predecessor-version":[{"id":2192,"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=\/wp\/v2\/posts\/2191\/revisions\/2192"}],"wp:attachment":[{"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.2bridgestech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}