ϲ

Skip to main content
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
STEM
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • ϲ Impact
  • |
  • The Peel
Sections
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • ϲ Impact
  • |
  • The Peel
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
STEM

World P@$$w0rd Day: Tips To Protect Your Digital Identity

Saturday, May 1, 2021, By Daryl Lovell
Share
CybersecuritySTEM

The first Thursday of May is , an annual reminder to promote better password habits and digital security. With more of our lives online than ever before, what should people know about passwords to better protect their identity and private information?

person in blue shirt against gray background

Michael Fudge

is a professor of practice in the School of Information Studies (iSchool). His areas of study center around digital transformation and the impact of information technology on society.

In this Q&A, Professor Fudge provides tips for password creation and advice on how to keep them safe and discusses extra safety steps you can set up on your devices today to better protect your digital identity.

Q: What are some of the most common mistakes people make when setting passwords?

Fudge: There are two common mistakes users make when deciding on which password to use.

First: using the same password for more than one account. When you re-use the same password on multiple websites, if one of those websites gets compromised and an attacker gets a hold of that password, they can use that password to gain access to the other sites. This is usually automated through an approach called credential stuffing. You should always use a different password for each account.

Second: using too simple of a password. When a website has password complexity requirements (must be at least 10 characters, one uppercase character, one digit, etc..) we sometimes resort to approaches that do not necessarily ensure good password complexity. For example, you might think using your middle name as a password (mine is Alexander) and then to meet the complexity requirements add the current year with a question mark (Alexander2020?). Automated attacks can take this into account nowadays so while at one time this was a good choice it no longer is. The more characters in the password the harder it is to guess, but to meet the length requirement we tend to do some really foolish things like:

  • Repeating the password pattern: Alexander2020?Alexander2020?
  • Adding the name of the site to the password, to make a unique password for each site: Alexander2020?google or Alexander2020?syr.edu

These password choices offer little additional complexity. They are predictable and provide insight into my algorithm, or process for creating a password.

The best choice for a password is a truly random sequence of characters that satisfy the complexity requirements. So how do you remember hundreds of randomly generated passwords? You don’t—use a password manager to do it for you.

The password manager is a personal database of your passwords. It will generate random passwords for you and store them securely. Some password managers will recall the password for you when to return to the site.

Q: So that leads well into this question…My iPhone offers me the option to create a complicated password and save it so I don’t have to remember it. Sounds like that is a good idea?

A: This is Apple’s keychain password manager. The Google phones have one as well. These options are better than you coming up with your own passwords. The risk is you are trusting Google or Apple to securely store your passwords, but it’s better than Post-It notes under your keyboard! There are third-party password manger services: Lastpass, 1Password, Dashlane, and RoboForm. They do the same thing but are not tied to just your phone or Apple/Google devices. The important thing to remember is that when you use these services, we are trusting these organizations to store the key that decrypts our passwords. If you wrote all your passwords in a notebook and locked that notebook in a safe, it would be like giving Google, Apple, Lastpass, etc. the keys to that safe. This is necessary for a password manager to function.

Q: How often should you be changing passwords? Are some accounts more important than others to update regularly?

A: With my passwords randomly generated, I do not change my passwords unless the service requires it.

What is really important is to enable two-factor authentication. This adds an extra layer of security, requiring you to not only know your password but also have a device that can verify your identity, most of the time this device is your smartphone. Two-factor might send SMS TXT to your phone each time you log in or use a special Authenticator app. For example, each time I log into my bank, I must reach for my phone and allow it to read my fingerprint. That way if my bank password does get stolen an attacker would also need my phone (and fingerprint) to log in to my account.

Two-factor authentication also gives you peace of mind as I get a notification each time someone tries to use my password to log in. If that person isn’t me, I need to change my password.

If the service supports two-factor, I turn it on. If you use a password manager to store your passwords, enable two-factor to protect your passwords!

Q: What are your thoughts on other types of security measures connected to biometric technology, such as facial recognition and fingerprint security?

A: These technologies work well as part of a two-factor strategy. For example, facial recognition paired with a pin on your phone is a good idea.

Q: With many of us living in the digital world now more than ever, what do we neglect or not know about when it comes to passwords and our digital security?

A: The ways attackers can attempt to obtain our passwords are numerous and varied. Some things we can control, like only installing software from trusted sources, and never clicking on links in an email. For the times the company gets hacked and the password exposure is not your fault, I suggest checking the email used when you signed up for the service on . When you enter your email, it will check to see if that email account was used with a service where your data was leaked. For the companies appearing on that list, change your password on that company’s website and set up two-factor if allowed.

 

  • Author

Daryl Lovell

  • Recent
  • Former Orange Point Guard and Maxwell Alumna ‘Roxi’ Nurse McNabb Still Driving for an Assist
    Tuesday, July 8, 2025, By Jessica Smith
  • Empowering Learners With Personalized Microcredentials, Stackable Badges
    Thursday, July 3, 2025, By Hope Alvarez
  • WISE Women’s Business Center Awarded Grant From Empire State Development, Celebrates Entrepreneur of the Year Award
    Thursday, July 3, 2025, By Dawn McWilliams
  • Rose Tardiff ’15: Sparking Innovation With Data, Mapping and More
    Thursday, July 3, 2025, By News Staff
  • Law Professor Receives 2025 Onondaga County NAACP Freedom Fund Award
    Thursday, July 3, 2025, By Robert Conrad

More In STEM

6 A&S Physicists Awarded Breakthrough Prize

Our universe is dominated by matter and contains hardly any antimatter, a notion which still perplexes top scientists researching at CERN’s Large Hadron Collider. The Big Bang created equal amounts of matter and antimatter, but now nearly everything—solid, liquid, gas or plasma—is…

Setting the Standard and Ensuring Justice

Everyone knows DNA plays a crucial role in solving crimes—but what happens when the evidence is of low quantity, degraded or comes from multiple individuals? One of the major challenges for forensic laboratories is interpreting this type of DNA data…

Student Innovations Shine at 2025 Invent@SU Presentations

Eight teams of engineering students presented designs for original devices to industry experts and investors at Invent@SU Final Presentations. This six-week summer program allows students to design, prototype and pitch their inventions to judges. During the program, students learn about…

WiSE Hosts the 2025 Norma Slepecky Memorial Lecture and Undergraduate Research Prize Award Ceremony

This spring, Women in Science and Engineering (WiSE) held its annual Norma Slepecky Memorial Lecture and Award Ceremony. WiSE was honored to host distinguished guest speaker Joan-Emma Shea, who presented “Self-Assembly of the Tau Protein: Computational Insights Into Neurodegeneration.” Shea…

Endowed Professorship Recognizes Impact of a Professor, Mentor and Advisor

Bao-Ding “Bob” Cheng’s journey to ϲ in pursuit of graduate education in the 1960s was long and arduous. He didn’t have the means for air travel, so he voyaged more than 5,000 nautical miles by boat from his home…

Subscribe to SU Today

If you need help with your subscription, contact sunews@syr.edu.

Connect With Us

© 2025 ϲ. All Rights Reserved.