Creating a secure password, and one that you will remember!

Posted on Tags , Leave a comment

Creating a secure password, and one that you will remember!

We all know how annoying it is to try and come up with a password that is not only secure but that is memorable. It also seems like almost every week another company has been hacked and passwords stolen.

In the continuing battle to create unique passwords, I’m sure many of us end up with variations on a theme. If the ones below look familiar… read on!

  • Football clubs
  • Family names
  • Pet names
  • Date of Birth

A recent attack on Adobe has revealed how insecure many people’s passwords are. The list below highlights the most common passwords found in the Adobe breach.

  • 123456
  • 123456789
  • password
  • admin
  • 12345678
  • qwerty
  • 1234567
  • 111111
  • photoshop
  • 123123
  • 1234567890
  • 000000
  • abc123
  • 1234
  • adobe1
  • macromedia
  • azerty
  • iloveyou
  • aaaaaa
  • 654321

Perhaps even some of those look familiar!

So what goes into creating a strong password?

  1. Ideally you should look to have a minimum of 8 characters. The reason for this is that length is the only factor that will exponentially increase the time it takes for a password to be cracked.For example, the password “!24Thp*” may look secure but in fact “applerunningseatablebasket” is a more secure choice.
  2. Include uppercase letters, numbers and symbols.
  3. Exclude any personal information, for example dates of birth, favourite football teams, and spouse’s names.
  4. Don’t write your passwords down! Instead, make an abstract note that will jog your memory but give nothing else away.
  5. Create a new password for every account you own.
  6. Don’t reuse passwords. Once you know a password has been broken, or you have been notified by a company that there is the possibility of your password having been compromised, abandon it. It’s highly likely that broken passwords end up being added to a list for future dictionary attacks.

So, with all that in mind, how can I come up with a safe password?

A security expert named Bruce Schneier created a method in 2008 that he still recommends today.

‘Combine a personally memorable sentence with some personally memorable tricks to modify that sentence into a password to create a lengthy password.’

For example:

Wtdo3sacamerat@ke?Ptrs! – What does a camera take? Pictures!

Grt!Iluvthew33kEND –  Great! I love the weekend!

Protecting your data from the government

Posted on Tags , , , , Leave a comment


What is The Draft Communications Data Bill?

Draft legislation that will require Internet Service Providers to maintain records of each user’s internet browsing activity (including social media), email correspondence, voice calls, internet gaming, and mobile phone messaging services and store the records for 12 months.

For a commentary on the bill, please visit:

Why does Privacy matter?

How can I prevent this?

While the arguments for and against this are wide ranging, we are here to assist those of you who wish to protect your online privacy.

There are a variety of services that can be used to mask your activity, each with their own pros and cons. These are:

Virtual Private Networks – Allowing you to send your data via a third party, thus hiding its origin.

Tor Anonymity Network – Utilizing multiple volunteer-operated servers to route your traffic, thus hiding its origin.

More information can be found here:

If you would like further information on how we might assist you in protecting your online privacy, contact us today.

Copyright © 2018 Convergence. All rights reserved.