News

New year, new password?

The beginning of the year is a good time to change passwords on devices and applications for which we want to maintain a high level of security, or in any case to avoid using the same passwords, as always, as a precaution.

There are several methods by which computers can be attacked, regardless of whether the device is a mobile phone, tablet or computer.

  • With dictionaries or word lists. An attacker program reads from a database or data dictionary and attempts to penetrate the system.
  • With rules. This system is more sophisticated than the previous one, as the rule has to be discovered and programmed, but in the end you always get access.
  • By brute force. This is the least sophisticated method, as it is a matter of testing and trial and error, requiring a lot of processing power.
  • With a mixture of the above. Hybrid attack.

If we have a 4-digit password, the attacker will only need 10,000 attempts to break in. That may seem like a lot, but in less than a second it is achieved. We have to think that the attacker has enough technology to achieve his goal. We can repeat the process, but for lowercase letters (27) taken 4 by 4, 531,441 attempts will be needed, as we can see, that is a lot more, but only a few seconds for a computer.

If we increase to uppercase letters, lowercase letters and special characters we will have a total of 97 cases (numbers, letters and special characters) to choose from and, if we go back to 4 digits, the possibilities would be 88,529,281, as we can see the number of attempts increases by increasing the number of characters to choose from. Also, if we increase the length of the password from 4 to 10, the attacker would have to make 73,744,400,000,000,000,000,000,000 attempts.

Passwords follow the 20/60/20 rule. A 20% is easy, only numbers or letters and less than 7 characters long, a 60% of medium difficulty between 7 and 10 characters long and a 20% longer and more difficult.

The longer the passwords the better, combining numbers and letters, some of them upper or lower case and with some special character. This is all very well, but is it practical? We should think that simple 1234...or similar codes are easy to find. Keeping passwords on an Excel sheet, or a postit or paper, is risky because it can fall into the hands of someone to whom we certainly make everything easy.

Fleeing the keyboard walking

Therefore, we should shy away from extremely simple things or methods such as following a sequence on the keyboard (keyboard walking). An easy to remember sequence of numbers are dates in ddmmyyyy or similar format, we already have 8, if we add a phrase, name, surname that we remember and in some specific position in upper or lower case and intermingle a number, we begin to have something much more serious. If we also add special characters, we will have a system with little or no vulnerability.

There are applications that when you try to access them a finite and low number of times, let's say three, without success, automatically revoke the user and force you to change the password.

Finally, we can classify passwords into two large groups: those that are important to us, for data, access to banks or sensitive information. Or those that we use for certain queries or access, such as certain newspapers or other types that do not require complex passwords. The aim is that we have our own algorithm, which we can remember, which allows us to change it from time to time, avoiding unnecessary risks.


Manuel García Ramírez
Director at MGR IT and Security Consultants

José Antonio R. Piedrabuena -- Coping with the stressful effects of the pandemic

It is common to spend a lot of money on anti-ageing treatments, but the truth is that the only scientifically proven treatment is exercise. I have seen some people after six months and found them aged due to lack of exercise. Exercise has many beneficial effects on the health of the brain,...

Javier Eizaguirre -- Sailing the seas of trust

"Good sailors are forged in rough waters not in dry harbour..." "87% of employees are disengaged" (Workforce of 2020 by Oxford Economics) Other sources put this figure even higher... In Europe and Spain it is close to 90% and 93% respectively" (State of the Global Workplace by...

The companies were this

Many things will change when all this is over and COVID-19 is just another chapter in Spain's economic history. The lives of many people will have changed, certain forms of work organisation will have changed, we hope even the production model, in a shift towards a more industrialised country...

Social networks, key in the strategy to build a lovemark

For brands, social networks are key elements in their communication strategies due to their capacity to generate affective and lasting links with their consumers and potential customers, members of their digital community. These virtual communities are made up of a group of individuals who follow a brand on social media.

Featured images from the PROA Mental Health Observatory

Paz Martín: "Whenever there is a crisis, women's rights slow down".

In this interview with PROA Comunicación, Paz Martín, president of BPW Madrid, analyses the position of women in the business world. She admits that "the values, principles and discourse that motivated the creation of BPW, the most influential women's lobby in the world, in...

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.