黑料不打烊

Skip to main content
  • Home
  • About
  • Faculty Experts
  • For The Media
  • 鈥機use Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
STEM
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • 黑料不打烊 Impact
  • |
  • The Peel
Sections
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • 黑料不打烊 Impact
  • |
  • The Peel
  • Home
  • About
  • Faculty Experts
  • For The Media
  • 鈥機use Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
STEM

World P@$$w0rd Day: Tips To Protect Your Digital Identity

Saturday, May 1, 2021, By Daryl Lovell
Share
CybersecuritySTEM

The first Thursday of May is , an annual reminder to promote better password habits and digital security. With more of our lives online than ever before, what should people know about passwords to better protect their identity and private information?

person in blue shirt against gray background

Michael Fudge

is a professor of practice in the School of Information Studies (iSchool). His areas of study center around digital transformation and the impact of information technology on society.

In this Q&A, Professor Fudge provides tips for password creation and advice on how to keep them safe and discusses extra safety steps you can set up on your devices today to better protect your digital identity.

Q: What are some of the most common mistakes people make when setting passwords?

Fudge: There are two common mistakes users make when deciding on which password to use.

First: using the same password for more than one account. When you re-use the same password on multiple websites, if one of those websites gets compromised and an attacker gets a hold of that password, they can use that password to gain access to the other sites. This is usually automated through an approach called credential stuffing. You should always use a different password for each account.

Second: using too simple of a password. When a website has password complexity requirements (must be at least 10 characters, one uppercase character, one digit, etc..) we sometimes resort to approaches that do not necessarily ensure good password complexity. For example, you might think using your middle name as a password (mine is Alexander) and then to meet the complexity requirements add the current year with a question mark (Alexander2020?). Automated attacks can take this into account nowadays so while at one time this was a good choice it no longer is. The more characters in the password the harder it is to guess, but to meet the length requirement we tend to do some really foolish things like:

  • Repeating the password pattern: Alexander2020?Alexander2020?
  • Adding the name of the site to the password, to make a unique password for each site: Alexander2020?google or Alexander2020?syr.edu

These password choices offer little additional complexity. They are predictable and provide insight into my algorithm, or process for creating a password.

The best choice for a password is a truly random sequence of characters that satisfy the complexity requirements. So how do you remember hundreds of randomly generated passwords? You don鈥檛鈥攗se a password manager to do it for you.

The password manager is a personal database of your passwords. It will generate random passwords for you and store them securely. Some password managers will recall the password for you when to return to the site.

Q: So that leads well into this question鈥y iPhone offers me the option to create a complicated password and save it so I don鈥檛 have to remember it. Sounds like that is a good idea?

A: This is Apple鈥檚 keychain password manager. The Google phones have one as well. These options are better than you coming up with your own passwords. The risk is you are trusting Google or Apple to securely store your passwords, but it鈥檚 better than Post-It notes under your keyboard! There are third-party password manger services: Lastpass, 1Password, Dashlane, and RoboForm. They do the same thing but are not tied to just your phone or Apple/Google devices. The important thing to remember is that when you use these services, we are trusting these organizations to store the key that decrypts our passwords. If you wrote all your passwords in a notebook and locked that notebook in a safe, it would be like giving Google, Apple, Lastpass, etc. the keys to that safe. This is necessary for a password manager to function.

Q: How often should you be changing passwords? Are some accounts more important than others to update regularly?

A: With my passwords randomly generated, I do not change my passwords unless the service requires it.

What is really important is to enable two-factor authentication. This adds an extra layer of security, requiring you to not only know your password but also have a device that can verify your identity, most of the time this device is your smartphone. Two-factor might send SMS TXT to your phone each time you log in or use a special Authenticator app. For example, each time I log into my bank, I must reach for my phone and allow it to read my fingerprint. That way if my bank password does get stolen an attacker would also need my phone (and fingerprint) to log in to my account.

Two-factor authentication also gives you peace of mind as I get a notification each time someone tries to use my password to log in. If that person isn鈥檛 me, I need to change my password.

If the service supports two-factor, I turn it on. If you use a password manager to store your passwords, enable two-factor to protect your passwords!

Q: What are your thoughts on other types of security measures connected to biometric technology, such as facial recognition and fingerprint security?

A: These technologies work well as part of a two-factor strategy. For example, facial recognition paired with a pin on your phone is a good idea.

Q: With many of us living in the digital world now more than ever, what do we neglect or not know about when it comes to passwords and our digital security?

A: The ways attackers can attempt to obtain our passwords are numerous and varied. Some things we can control, like only installing software from trusted sources, and never clicking on links in an email. For the times the company gets hacked and the password exposure is not your fault, I suggest checking the email used when you signed up for the service on . When you enter your email, it will check to see if that email account was used with a service where your data was leaked. For the companies appearing on that list, change your password on that company鈥檚 website and set up two-factor if allowed.

 

  • Author

Daryl Lovell

  • Recent
  • Falk College Sport Analytics Students Win Multiple National Competitions
    Friday, May 16, 2025, By Cathleen O'Hare
  • Physics Professor Honored for Efforts to Improve Learning, Retention
    Friday, May 16, 2025, By Sean Grogan
  • Historian Offers Insight on Papal Transition and Legacy
    Friday, May 16, 2025, By Keith Kobland
  • Live Like Liam Foundation Establishes Endowed Scholarship for InclusiveU
    Tuesday, May 13, 2025, By Cecelia Dain
  • ECS Team Takes First Place in American Society of Civil Engineers Competition
    Tuesday, May 13, 2025, By Kwami Maranga

More In STEM

Physics Professor Honored for Efforts to Improve Learning, Retention

The聽Department of Physics聽in the College of Arts and Sciences (A&S) has made some big changes lately. The department just added an astronomy major approved by New York State and recently overhauled the undergraduate curriculum to replace traditional labs with innovative…

ECS Team Takes First Place in American Society of Civil Engineers Competition

Civil and environmental engineering student teams participated in the American Society of Civil Engineers (ASCE) Sustainable Solutions and Steel Bridge competitions during the 2025 Upstate New York-Canada Student Symposium, winning first place in the Sustainable Solutions competition. The symposium was…

Chloe Britton Naime Committed to Advocating for Improved Outcomes for Neurodivergent Individuals

Chloe Britton Naime 鈥�25 is about to complete a challenging and rare dual major program in both mechanical engineering from the College of Engineering and Computer Science and neuroscience from the College of Arts and Sciences. Even more impressive? Britton…

Graduating Research Quartet Synthesizes Long-Lasting Friendships Through Chemistry

When Jesse Buck 鈥�25, Isabella Chavez Miranda 鈥�25, Lucy Olcott 鈥�25 and Morgan Opp 鈥�25 started as student researchers in medicinal chemist Robert Doyle鈥檚 lab, they hoped to hone their research skills. It quickly became evident this would be unlike…

Biologist Reveals New Insights Into Fish’s Unique Attachment Mechanism

On a wave-battered rock in the Northern Pacific Ocean, a fish called the sculpin grips the surface firmly to maintain stability in its harsh environment. Unlike sea urchins, which use their glue-secreting tube feet to adhere to their surroundings, sculpins…

Subscribe to SU Today

If you need help with your subscription, contact sunews@syr.edu.

Connect With Us

© 2025 黑料不打烊. All Rights Reserved.