Skip to content

How To ALWAYS Remember Unique Passwords

These days, it is important to realize that EVERYONE is a potential target for hackers. It is not wise to forego your cyber safety because you don’t think you have anything worth taking.

Hackers can get access to your snapchat photos that you thought were long gone, they can track and steal your packages on your Amazon account, they can even see your location and your children’s locations if you have a smartphone. They can weasel their way into your phone and personal computer, they can attack at home or at work. The easiest way they can do this is by tricking you into giving up your passwords.

It is recommended by most cybersecurity experts that you change your password every 4 months, or 3 times a year. It is also recommended that you use a capital letter, a number and an uncommon character such as ‘$’.  This can be a lot to keep up with, especially if you use a different password for every account.

A lot of systems require you to change your password every 4 months to keep your access. Because of these frequent changes, too many people make the decision to write their passwords down in a notebook or, even worse, in a file on their computer.

It is important to pick a password you can remember easily that will also keep your information safe. A fun idea is to make your password a goal, resolution, something you need to remember, or even a personal mantra. Here are some good ideas:

  • L0seTenP0unds
  • Save$500!
  • icAnD0Anything
  • SaraOwesMe$10

Think about how many times you type your password in a day, not only will you be staying safe, you’ll be staying motivated!

Here at WheelHouse IT, we are passionate about maintaining your cyber safety. Your peace of mind is our top priority. Take the time to contact us about your cybersecurity needs so we can work together to protect you, your business, and your family.

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.