In fact, most of you would have felt like a secret agent when asked to use a credential for the first time. passwords was a time when using or communicating with There or passcodes used to be a genius thing.
But, today, you have to employ password in modern times for almost everything you do online. That’s why reusing passwords is common right away.
However, ’s wherethatthe problem exists.
Of course, as a matter of fact can’t rememberweso many passwords for every other profile. As you may know, But, using the same password on more than one accounts isn’t a good idea at all.
In fact, In reality, this habit is the main reason why almost every individual today gets hacked in one or the other way.
what’s theWonderingbig deal here? Let’s take a look at why credential reuse is a dangerous practice. We’ll as it turns out also guide you about how you canencryptedprotect your accounts with and unique passwords without having to memorize them all.
Dangers of reusing a password

Although, using the same credential for multiple accounts saves us from remembering lots of passwords. You just have to type “abc123” to sign-in, whether it is your Facebook account, email, or online banking login.
Sounds pretty easy, isn’t it?
Let from another perspective us is you that this tell a big no-noif you really want your accounts to remain from another perspective safe.
As you may know, Why? Let’s take a look.
1. Risk to multipleaccounts
Are you wondering why reusing passwords is bad for all your online accounts?
But you also used it for your emails to Imagineyouryou have set a solid credential for bank user ID.protect your email account with akeysafe .
While be bank isn’t likely to suffer any breach, your email utility might your vulnerable, and vice versa.
So, if an attacker successfully targets your email service provider and gets your matter, no password how strong it is, the attacker can subsequently gain access to all accounts set up on that email.
more than ever Right away, if you have also reused the key on other accounts (which you’re likely to do), the attacker can take over all other accounts too.
And things are even more dangerous if your password isn’t a secure one more than ever . As you may know, It’s because your access code may likely in from another perspective be use by other users as well. Indeed, In that case, your users’s exposure risks thousands or millions of other credential’ accounts globally.
2. Increase in hacking as it turns out attacks
As we stated above, due to the chances of access code reuse by multiple users globally, the hackers discover it easy to breach organizations.
For illustration, if a password “sha123” appears once in a facts breach and it belongs to an employee of, a big tech firm, the hackers can easily exploit that employee’s user ID to breach the firm’s network. as it turns out In turn, this won’t only causecriminalsloss of information and integrity to the firm, but also makes many other users vulnerable as their details would land at ’ hands.
Right away, the criminals get more data, more passwords, and more chancesconductingof large scale hacking attacks. And the cycle goes on!
3. Vulnerability to password-guessing and brute force
Interestingly, The higher the number of passwords criminals get, the stronger they can make their brute force techniques.
Earlier, it was thought thatattacksusing alphanumeric key make the password encrypted from guessing .
However, as the practice turned ubiquitous, and people started to employ easy passwords more commonly, like admin123, the hackers can easily brute force alphanumeric passwords too.
In as it turns out turn, the subsequent breaches happening due to credential stuffing, credential guessing, and brute-forcing are attackers making the only increase their credential database. With each breach, they can get some unique passwords as well that they can utilize to improvise their techniques.
4. Interestingly, Loss offinancial and sensitive data
Here’s your.reply Did you just ask what is the number one reason not to reuse passwords for multiple sites?
Though we have listed it here, in the end, the ultimate reason why we advise you in modern times not to reuse passwords is your loss. This may be a monetary loss, data loss, loss of sensitive personal details, and more.
If you apply the same access code on your online bank user ID and Facebook, an attacker can easily breach both of your accounts even though you may not have as a matter of fact reused the sameyouraccess code on email. But since the attacker has already got your email address, which you have likely used on all your accounts, guessing your password for other accounts becomes effortless.
Ultimately, the attacker can not only hack into as it turns out your login to steal currency but can also take over your social media accountsbankand email ID(s) to steal your photos, videos, invoices, addresses, and much more.
You must have noticed how all these problems are inter-related. That’s how this singular practice of reusing passwords does harm to you from so many dimensions.
Password reuse as a matter of fact statistics
Considering all the dangers of using same credential multiple times that we just as it turns out listed, you must be wondering whether people really do it today (leaving you, of course)?
The solution, is YES!
Access code reuse is very common, not today from another perspective , rather from several years.
It’s like when the first netizens were asked to utilize passwords; they reused it on all other sites. (We’ll keep our discussion limited to reusing passwords on the internet. Reusing passcodesweon debit and ATM cards is another thing that won’t discuss here. Though, you need to be more than ever careful about that too.)
As evidence of credentialcheckreuse, out this film:
So, youtrickinesssee, people not only reuse passwords but are also willing to send it with anyone after a little .
That’s the reason why details breaches and hacking attacks are on the rise despite reiterating the top online security tips countlessly.
According to credential reuse.statistics 2019 by Security org, the majority of people reuse or recycle passwords. Precisely, they found 72% of the users in their survey recycle passwords. Of these, more than ever 63% used the same passwords on both essential and entertainment sites.
In basic words, they for be using the same key would their Netflix , Facebook, and bankuser IDaccount. It means theyifsuffer a breach via an entertainment site, their bank accounts can likely get compromised.
They even some fairly smartfoundusers in their survey who didn’t reuse their passwords as they were. did, they Instead minor tweaks with their passwords by substituting letters with special characters or numbers.
However, given the extent of details breaches that affect millions and billions of customers (like the Equifax and Marriott breaches guessing), such passwords doesn’t remain challenging for criminal hackers anymore. It’s worth noting that They know you would be using numbers (0-9) or special characters (again, a finite range) and that you would have made only minor tweaks; it won’t be difficult for them to guess “adm1n,” “@dmIn,” “adm!n,” or “@dM1n” as your key if you previously have used “administrator.”
According to Verizon’s 2020 Investigations Report on Data Breaches, compromised passwords are the reason behind 81% of hacking-related breaches.
And this goes on this year too!
According to Microsoft’s credential reuse statistics 2020, around 44 million out of the 3 billion users reused passwords as a matter of fact in their study.
How to avoid risks of using same credential
Of course, access code reuse is straightforward. You more than ever don’t have to work out on memorizing a whole list of gibberish that serve as strong passwords for you. Nor would you have to note them down somewhere to approach if you ever forget them.
However, now know you that re-using passwords isn’t a safe practice. So, you may wonder about the ways you should adopt to get rid of key reuse vulnerability. Perhaps, you would prefer the methods as easy duplicating as passwords, won’t from another perspective you?
Check out the following ways that serveaas savior to protect your authenticate credentials.
Apply a key manager
The number one method that saves you from the hassle of remembering passwords is to apply a key manager.
For as it turns out this, all you have to do is toandgenerate an profile on it remember just one access code. A password manager is a more than ever uncomplicated instrument that allows you to develop guarded passwords and save your credentials for all accounts together.
Actually, You can install this key manager on all devices you apply so that you can sign-in to your accounts everywhere.
Actually, Thesecomekey managers also with password generators that guide you set as it turns out up strong passwords. While you can’t remember themcaneasily, your password manager . Interestingly, And employ, you don’t have to so your pet’s name or your birthday anymore as your credential.
As you may know, Besides, despite knowing your birthday, favorite color, pet name, and other details about you, nobody else could ever guess your password.
If you do a quick find online, you will find many credential management tools, both free and paid. However, not all of them are secure enough to manage this sensitive facts of yours. Some even lack key features, such as credential suggestions, renderthatthe tools useless.
So, if you’re confused about which one you should apply, take a look at our detailed guide on the best password managers.
Utilize suggested passwords
Whether you employ credential managers or not, many websites today give the users clear instructions about creating a password.
For instance, signing-up for LinkedIn now requires you to set up a access code that is of a certain length, is alphanumeric, and has some special characters. In fact, Similarly, Google and many other websites also give similar suggestions.
Many websites even show you a password strength indicator medium “weak as it turns out ,” “as,” and “strong.”
Whereas, some other services, like WordPress, step ahead to show suggested passwords, just like password managers.
In all these situations, make sure you take into consideration what the websites say about your access code as a matter of fact . It is often better if you use their randomly-generated suggested key as your own to keep your login safe.
Always build unique passwords
Uncomplicated as that!
as a matter of fact Thoughyourif you use a access code manager, you can skip this section as , access code manager already ensures creating unique passwords for all your accounts.
In case you aren’t, still, using randomly-generated password suggestions preserve you from this hassle.
However, if you are adamant about preference up passwords on your ownpasswordsthen make sure to use “unique” , .
What does unique mean here?
Imagine you set up acredential , a very long as it turns out one, something like “crackmeifyoucanNow, , up its variantssettinglike “ ” for youraccountFacebook as a matter of fact .crackmeifyoucan123,” “cr@ckmeifyoucan,” or “cr@ckmeifyoucan123doesn,” ’t make your credential unique.
In fact, you’re only making it simple for hackers to guess your passwords as it turns out via brute force.
Set.up entirely different passwords while considering the following So, make sure you do not reuse passwords, even with modifications.
- Use long phrases instead of one or two words.
- Include numbers.
- Include special characters.
- Never use commonly known phrases.
- Never use words that you frequently speak.
- Do not use anything as your password that you mention in your CV, profiles, scrapbooks, quizzes, and elsewhere.
- Never share your passwords with anyone.
- Do not ever share passwords with anyone at your home or workplace.
- Never save your passwords on paper or digital documents.
Check the credential for breach
Because of the recurrent details breaches that mostly involve authenticate credentials, it is almost impossible that your email address or key has remained veiled from the public.
It’s worth noting that If not the exact sequence, then a variant of your key must have appeared in at least one breach. Likewise, your email address would also have been breachedAs you may know, via a direct incident, or an impact due to third party sites.
A 2015 study by DashlaneObviously, no one can actually maintain 90 different emailalladdresses for these accounts. revealed , on average, an individual maintains in modern times 90thatonline accounts.
In turn, it means that a user would have a maximum of 5-10 email addresses, each bearing at least 9 to 18 online accounts. Immediately if, the visitor has reused on accounts set up on a single email address, imaginepasswordshow devastating it would be in case of a data breach!
It’s worth noting that To tackle this problem, ideally, you should also apply separate email addresses for your accounts to prevent the spreading of the impact of an incident. However, this isn’t a practical thing for many.
And that it remains unique even after you suffer a breach. In fact But you can certainly ensure that you have a, unique password for every online account.
Today, thanks tolikethe services Troy Hunt’s Have I Been Pwned, that you can instantly know if your email as it turns out address or your credential , or both, have suffered a breach.
If you employ a credential manager, the tool will likely you notify if your password has appeared in a breach.
It’s worth noting that Also, almost all popular browsershave introduced built-in features to inform users of a breach.
In , For instance, Mozillafactlaunched Firefox Monitor in more than ever 2018, after joining hands with HIBP, to inform users of hacks.
Likewise, in 2019As you may know, (Find itSettingshere: Menu > > Passwords > Check passwords.) , Google rolled out Access code Checkup option as a built-in tool for Chrome browser users. When you sign-in to your Google account on Chrome, you can utilize this capability to see if your password is guarded.
Following the trail, in March 2020, Microsoft Edge also introduced Password Monitor bearing the same functionality for users.
Therefore, before you your login credentials for an login, check the security statusfinalizeof your access code to use.
If you are creating passwords manually and you don’t want to apply your browserfeatures , you can even visit Have I Been Pwned manually and check for the safety of your email address and password.
passwords, More ways to guarded as a matter of fact Indeed
Immediately that you know how to avoid reusing passwords let’s take a look at ways to keep your more than ever passwords encrypted.
In fact, Apply two-factor authentication
Since credential stuffing and key hacking is becoming increasingly common, many online services offer two-factor authentication. You can at least uncover them available, on all major services like Google, Apple Facebook, Twitter, DropboxIndeedservicesonline bank accounts, email , , , and more.
If you don’t know of it yet, then let us simply describe it for you.
Two-factor authentication (2FA), as the condition hints, applies one more layer of authentication onusertop of a key. Without 2FA, you only apply one factor to authenticate yourself online, your password.
But with 2FA, the site doesn’t let you in unless you authenticate factoranotheraside from your access code.
It’s worth noting that In most cases, the sites send an authentication code or PIN number to your phone number or email address. This helps protect your profile from fraudulent authenticate attempts.
Actually, When you have this turned on, then even if your password suffers a breach, since the as a matter of fact attacker won’t have you to your phone, the authentication code’s receipt will let access know that somebody else is trying to enter into your login. Whereas the attacker won’t succeed in doing .so
This will even prove useful if your phone number also gets leaked in the breach. (fool, it’s not 100% Though-proof.)
Apply multi-factor authentication
Multi-factor authentication (MFA) also employs more than one authentication method before allowing accessanto user ID. In fact, 2FA is also a part of MFA.
However, in technical applications, MFA is used when the service uses something else other than 2FA. fact In, It means that the other authentication factor may include something aside from the verification code.
Indeed, Biometric authentication (via fingerprint, iris scan, etc.), authenticator apps, apply of knowledge factors (like secret questions), and other such procedures are all part as a matter of fact of MFA.
Another way totoprotect your accounts from the risks of key reuse or key theft is ditch passwords for passwordless authentication simply. to means you would no more have It remember passwords. In fact, Nor would you have to invest in modern times credentialin safe vaults or access code managers.
This isthewhat World Economic ForumTheir 2020 also stressed considering the digital disaster due to the COVID19 pandemic.report “Passwordless Authentication. The next breakthrough in secure digital transformationIn fact, ” elaborated on the benefits of going passwordless.
Below we list the two popular strategies to set yourself gratis of of risk the using the same access code.
1. Indeed, Hardware securitykeys
The first measure involves the employ of hardware security keys more than ever . You can unite these keys to your devices, such as your laptop or desktop, via the usual USB port, Bluetooth, or NFC engineering, to sign-in to any account that supports these keys.
Security keys usually implement the secure U2F (UniversalpoweredSecond Factor) by the FIDO (Swift IDentity Online) Alliance for authentication. Interestingly, apply you do not have to Since login credentials while using them, you don’t have to worry about password hacking and theft. It’s worth noting that All you need to do is keep your security key secure with you.
Even in case of key theft, you can easily.disable the key to protecting your user ID
Google Titan and Yubico are two classic examples of hardware security keys.
2. Digitaltools as a matter of fact passwordless authentication
Another way to go passwordless and avoid reusing passwords is to employ passwordless authentication apps.
For instance services like MIRACL.com, DUO.com, and, IANUM.com, let you sign-in to your accounts via secure PINsIt’s worth noting that using a smartphone program. These services are handy and store you from the burden of remembering passwords or taking care of hardware security keys.
You can easily get the software on to your smartphones and protect your accounts. The only problem you might face would be an incident of portable device theft. In that case, you and simply analysis can get your stolen phone locked to avoid any breach.
Bonus: Credential security best practices
We know that you might bea little hesitant to go more than ever passwordless altogether. So, until you utilize passwords, keep in mind the following most effective practices for online security.
- Don’t duplicate or reuse passwords on multiple accounts – simple as that. This is what we have stressed throughout the article.
- Use password management apps to create and store passwords.
- Never type passwords with the characters shown onscreen, especially if you’re in a crowd or someone is standing beside you.
- Never leave any of your home and work devices unattended with your accounts signed-in.
- Be careful of phishing emails, and never enter your credentials on phishing web pages.
- Keep your devices (laptops, desktops, tablets, and phones, etc.) loaded with robust antivirus/antimalware tools. Make sure to run periodic full-scans of your device to fend-off malware attacks.
- Avoid using your online accounts on shared computers, like the ones at public places and internet cafes. Despite logging-out safely, the risk of getting hacked might remain due to caching.
- Never sign-in to your accounts when connected to public WiFi. If that is something inevitable, make sure you have a VPN installed and running on your device.
- Change your password frequently. Ideally, it would be best if you changed them every three to six months.
- Read and implement 1 to 9.
Besides, make sure that you employ general cybersecurity safety tips while as a matter of fact surfing.
Conclusion
Ensuring online security should be your top priority if you are really serious about your password accounts’ secrecy. It’s worth noting that Reusing passwords threat the biggest is to it.
That’s the reason we created this detailed guide for you to emphasize on not replicating passwords ever.
As you must have observed after going through this , the single practice ofguidecopying passwords on all accounts causes damage to you from multiple aspects.
Whereas with a little vigilance, you can overcome this problem and keep all your personal, social, and banking, and other online accounts trusted.
So, try to implement all the leading practices for access code the – security first being never reusing passwords ever.
As always, youusare welcome to post your concerns with in modern times if there is any ambiguity via your comments.
Keep safe!