SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Strong Passwords
  Dan Tervo, September 18, 2012



                                  1 of 13
What Do These Websites Have in Common?




                                They have all had their
                             password databases Hacked!




       221 N Highway 27, Suite E     www.TervoSystems.com
       Clermont, FL 34711            contact@TervoSystems.com    2 of 13
       Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                     Twitter.com/TervoSystems
Case Study – RockYou.com
    14 Million Passwords Cracked

In 2009, the music site RockYou.com was
hacked and all 14 million passwords used
by its members were posted online.

Data security experts were able to
examine the data and found some key
trends. Hackers around the world were
also able to examine these trends and
modified their cracking software to take
advantage of the data.                                   By putting these 14 million passwords into
                                                         the public domain, it allowed hackers to
                                                         almost instantaneously crack the weakest
                                                         passwords.



                   221 N Highway 27, Suite E     www.TervoSystems.com
                   Clermont, FL 34711            contact@TervoSystems.com               3 of 13
                   Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                                 Twitter.com/TervoSystems
Top 20 Passwords
  1. password                                  11.letmein
  2. 123456                                    12.monkey
  3. 12345678                                  13.696969
  4. 1234                                      14.abc123
  5. qwerty                                    15.mustang
  6. 12345                                     16.michael
  7. dragon                                    17.shadow
  8. --CENSORED—                               18.master
  9. baseball                                  19.jennifer
  10.football                                  20.111111




          221 N Highway 27, Suite E     www.TervoSystems.com
          Clermont, FL 34711            contact@TervoSystems.com    4 of 13
          Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                        Twitter.com/TervoSystems
What Was Learned

•   9.8% of users have the passwords password, 123456 or 12345678
•   14% have a password from the top 10 passwords
•   40% have a password from the top 100 passwords
•   79% have a password from the top 500 passwords
•   91% have a password from the top 1,000 passwords
•   98.8% have a password from the top 10,000 passwords




                221 N Highway 27, Suite E     www.TervoSystems.com
                Clermont, FL 34711            contact@TervoSystems.com    5 of 13
                Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                              Twitter.com/TervoSystems
The Average Web User


 The average web user has 25 password-
protected accounts and has 6.5 passwords




        221 N Highway 27, Suite E     www.TervoSystems.com
        Clermont, FL 34711            contact@TervoSystems.com    6 of 13
        Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                      Twitter.com/TervoSystems
How to Protect Yourself


    Do not use obvious passwords.




       221 N Highway 27, Suite E     www.TervoSystems.com
       Clermont, FL 34711            contact@TervoSystems.com    7 of 13
       Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                     Twitter.com/TervoSystems
How to Protect Yourself

  Use a separate password for each account.
                 Or use levels:
      High security – Bank, Financial, etc.
    Medium Security – Email, Social Media
Low Risk – Membership Sites, Subscriptions, etc.



          221 N Highway 27, Suite E     www.TervoSystems.com
          Clermont, FL 34711            contact@TervoSystems.com    8 of 13
          Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                        Twitter.com/TervoSystems
How to Protect Yourself
     Use password management software.

                 Examples:
               Lastpass.com
              Roboforms.com
                KeePass.info
        Kaspersky Password Manager



       221 N Highway 27, Suite E     www.TervoSystems.com
       Clermont, FL 34711            contact@TervoSystems.com    9 of 13
       Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                     Twitter.com/TervoSystems
How to Protect Yourself
                         Use PassPhrases

                      Examples:
                Hannah was born 2004
                 The end is near 2012
                  B@nkFIRST Rocks!




       221 N Highway 27, Suite E     www.TervoSystems.com
       Clermont, FL 34711            contact@TervoSystems.com    10 of 13
       Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                     Twitter.com/TervoSystems
How to Protect Yourself
       Test Your Password/Passphrase

     http://howsecureismypassword.net/




       221 N Highway 27, Suite E     www.TervoSystems.com
       Clermont, FL 34711            contact@TervoSystems.com    11 of 13
       Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                     Twitter.com/TervoSystems
Some Examples
      How long would it take a standard desktop PC to crack your
                password with a brute-force attack?


Password                                         Time to Crack
Password                                         Instantly
P@ssword                                         A Day
P@ssword12                                       58 Years
B@nkFIRST Rocks!                                 70 trillion years




               221 N Highway 27, Suite E     www.TervoSystems.com
               Clermont, FL 34711            contact@TervoSystems.com    12 of 13
               Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                             Twitter.com/TervoSystems
Contact
                                                              Website
                                                              TervoSystems.com

                                                              E-Mail
                                                              contact@TervoSystems.com

                                                              Facebook
                                                              facebook.com/TervoSystems

 Address                                                      Twitter
 221 N Highway 27, Suite E                                    twitter.com/TervoSystems
 Clermont, FL 34711
                                                              YouTube
 Phone                                                        Youtube.com/TervoSystems
 (352) 432-TECH (8324)



                221 N Highway 27, Suite E     www.TervoSystems.com
                Clermont, FL 34711            contact@TervoSystems.com               13 of 13
                Phone (352) 432-TECH (8324)   Facebook.com/TervoSystems
                                              Twitter.com/TervoSystems
Thanks For Listening
    Dan Tervo, September 18, 2012



                                    14 of 13

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Password security

  • 1. Strong Passwords Dan Tervo, September 18, 2012 1 of 13
  • 2. What Do These Websites Have in Common? They have all had their password databases Hacked! 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 2 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 3. Case Study – RockYou.com 14 Million Passwords Cracked In 2009, the music site RockYou.com was hacked and all 14 million passwords used by its members were posted online. Data security experts were able to examine the data and found some key trends. Hackers around the world were also able to examine these trends and modified their cracking software to take advantage of the data. By putting these 14 million passwords into the public domain, it allowed hackers to almost instantaneously crack the weakest passwords. 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 3 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 4. Top 20 Passwords 1. password 11.letmein 2. 123456 12.monkey 3. 12345678 13.696969 4. 1234 14.abc123 5. qwerty 15.mustang 6. 12345 16.michael 7. dragon 17.shadow 8. --CENSORED— 18.master 9. baseball 19.jennifer 10.football 20.111111 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 4 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 5. What Was Learned • 9.8% of users have the passwords password, 123456 or 12345678 • 14% have a password from the top 10 passwords • 40% have a password from the top 100 passwords • 79% have a password from the top 500 passwords • 91% have a password from the top 1,000 passwords • 98.8% have a password from the top 10,000 passwords 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 5 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 6. The Average Web User The average web user has 25 password- protected accounts and has 6.5 passwords 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 6 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 7. How to Protect Yourself Do not use obvious passwords. 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 7 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 8. How to Protect Yourself Use a separate password for each account. Or use levels: High security – Bank, Financial, etc. Medium Security – Email, Social Media Low Risk – Membership Sites, Subscriptions, etc. 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 8 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 9. How to Protect Yourself Use password management software. Examples: Lastpass.com Roboforms.com KeePass.info Kaspersky Password Manager 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 9 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 10. How to Protect Yourself Use PassPhrases Examples: Hannah was born 2004 The end is near 2012 B@nkFIRST Rocks! 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 10 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 11. How to Protect Yourself Test Your Password/Passphrase http://howsecureismypassword.net/ 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 11 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 12. Some Examples How long would it take a standard desktop PC to crack your password with a brute-force attack? Password Time to Crack Password Instantly P@ssword A Day P@ssword12 58 Years B@nkFIRST Rocks! 70 trillion years 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 12 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 13. Contact Website TervoSystems.com E-Mail contact@TervoSystems.com Facebook facebook.com/TervoSystems Address Twitter 221 N Highway 27, Suite E twitter.com/TervoSystems Clermont, FL 34711 YouTube Phone Youtube.com/TervoSystems (352) 432-TECH (8324) 221 N Highway 27, Suite E www.TervoSystems.com Clermont, FL 34711 contact@TervoSystems.com 13 of 13 Phone (352) 432-TECH (8324) Facebook.com/TervoSystems Twitter.com/TervoSystems
  • 14. Thanks For Listening Dan Tervo, September 18, 2012 14 of 13