News

New year, new password?

The beginning of the year is a good time to change passwords on devices and applications for which we want to maintain a high level of security, or in any case to avoid using the same passwords, as always, as a precaution.

There are several methods by which computers can be attacked, regardless of whether the device is a mobile phone, tablet or computer.

  • With dictionaries or word lists. An attacker program reads from a database or data dictionary and attempts to penetrate the system.
  • With rules. This system is more sophisticated than the previous one, as the rule has to be discovered and programmed, but in the end you always get access.
  • By brute force. This is the least sophisticated method, as it is a matter of testing and trial and error, requiring a lot of processing power.
  • With a mixture of the above. Hybrid attack.

If we have a 4-digit password, the attacker will only need 10,000 attempts to break in. That may seem like a lot, but in less than a second it is achieved. We have to think that the attacker has enough technology to achieve his goal. We can repeat the process, but for lowercase letters (27) taken 4 by 4, 531,441 attempts will be needed, as we can see, that is a lot more, but only a few seconds for a computer.

If we increase to uppercase letters, lowercase letters and special characters we will have a total of 97 cases (numbers, letters and special characters) to choose from and, if we go back to 4 digits, the possibilities would be 88,529,281, as we can see the number of attempts increases by increasing the number of characters to choose from. Also, if we increase the length of the password from 4 to 10, the attacker would have to make 73,744,400,000,000,000,000,000,000 attempts.

Passwords follow the 20/60/20 rule. A 20% is easy, only numbers or letters and less than 7 characters long, a 60% of medium difficulty between 7 and 10 characters long and a 20% longer and more difficult.

The longer the passwords the better, combining numbers and letters, some of them upper or lower case and with some special character. This is all very well, but is it practical? We should think that simple 1234...or similar codes are easy to find. Keeping passwords on an Excel sheet, or a postit or paper, is risky because it can fall into the hands of someone to whom we certainly make everything easy.

Fleeing the keyboard walking

Therefore, we should shy away from extremely simple things or methods such as following a sequence on the keyboard (keyboard walking). An easy to remember sequence of numbers are dates in ddmmyyyy or similar format, we already have 8, if we add a phrase, name, surname that we remember and in some specific position in upper or lower case and intermingle a number, we begin to have something much more serious. If we also add special characters, we will have a system with little or no vulnerability.

There are applications that when you try to access them a finite and low number of times, let's say three, without success, automatically revoke the user and force you to change the password.

Finally, we can classify passwords into two large groups: those that are important to us, for data, access to banks or sensitive information. Or those that we use for certain queries or access, such as certain newspapers or other types that do not require complex passwords. The aim is that we have our own algorithm, which we can remember, which allows us to change it from time to time, avoiding unnecessary risks.


Manuel García Ramírez
Director at MGR IT and Security Consultants

Are You Growing or Entertaining Yourself?

One of the biggest problems in the market for training and coaching services in management skills is that we easily confuse entertainment with growth. Not only the clients, but even the trainers themselves confuse the art of growing as a person and as a leader with the enormous fun of...

Manuel García Ramírez -- COVID-19 and the different types of security

Security is generally thought of as only physical, and in some cases logical if it involves software or technology. But it is always people who are the ultimate target. ......

Arsonists and Rapists

We are surprised that a crocodile is so tender as to transport the eggs, from one place to another until their children are born, or that a panther is loving and takes great care of its children. In another scene we will see both with unusual ferocity. That is the...

National Security and COVID-19

The objective of Security is to ensure the integrity of people, physically and mentally, as well as everything necessary to achieve it, properties, health, food, communications, etc. To do so, it is necessary to determine the vulnerabilities of the system to be secured. Because in this way the risks can...

Ramón Tamames estimates a fall in Spanish GDP of 13% (and III)

In the third and last article of the series, Ramón Tamames, Professor of Economic Structure, Jean Monnet Chair of the European Union and member of the Royal Academy of Moral and Political Sciences, estimates the extent of the recession in Spain, and analyses the policies that are being implemented in the...

Now more than ever, the SME needs a contingency plan

"We're living this like a movie, a scary movie." This was the beginning of one of the many announcements that have flooded the net these days and which so well reflects the uncertainty that many entrepreneurs are experiencing. And perhaps it is for this very reason, because of the fear...

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.