X
Tech
Why you can trust ZDNET : ZDNET independently tests and researches products to bring you our best recommendations and advice. When you buy through our links, we may earn a commission. Our process

'ZDNET Recommends': What exactly does it mean?

ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing.

When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. Neither ZDNET nor the author are compensated for these independent reviews. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers.

ZDNET's editorial team writes on behalf of you, our reader. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. If we have made an error or published misleading information, we will correct or clarify the article. If you see inaccuracies in our content, please report the mistake via this form.

Close

Caught up in another password breach? Follow these 3 rules to protect yourself online

Oops, it happened again. Another popular service got hacked. Take this opportunity to get your passwords in order.
Written by Ed Bott, Senior Contributing Editor

Another day, another password breach. This time, the compromised website belongs to the Plex media-streaming service, and the advice is predictable: Reset your account password immediately.

Yes, of course you should do that. But don't stop there. Every one of these incidents is an opportunity to assess your current online security and tighten it up as needed. The goal is to make sure you're at minimal risk when (not if) another, similar data breach occurs. The best way to do that is to follow three ironclad rules:

  1. Always use a long, random password
  2. Never reuse a password
  3. Always turn on 2-factor authentication (2FA), if possible

If you followed those rules, you wouldn't have been particularly worried about today's password breach. Why? The hash of that long, random password can't easily be matched with its plaintext version, and even if the thieves managed to decrypt that password and try to use it before you changed it, they'd be stopped cold by the 2FA prompt.

Most importantly, if they tried those credentials on other sites, they'd have no success at all. The real danger of reusing passwords is that simply changing them in one place isn't enough. If you use the same password on multiple websites, you could be in a heap of trouble once the bad guys start trying the stolen Plex password on popular sites like Gmail and Outlook.com.

The good news is that a first-rate password manager can help you identify weak passwords and detect duplicates. Here's one example, a report generated by 1Password using its Watchtower feature:

1password-watchtower

A good password manager can alert you to weak or reused passwords

That's an excellent starting point for getting your passwords in order. And don't feel bad if the numbers seem alarmingly high. If you imported a collection of older passwords when you set up your password manager, then you're undoubtedly dealing with a collection of credentials you created yourself. Because human beings are notoriously bad at creating truly random strings of text, those passwords are probably weak, which means they can be easily guessed or are vulnerable to a brute-force attack.

A weak password is typically too short, is made up of words that can be found in a dictionary, and/or contains all or part of the account name. Even if you did manage to create a truly random, hard-to-guess password, your password manager will flag it if it determines you've used that password at multiple sites.

The good news is that every modern password manager also contains a password generator, which you can use to replace those old, weak, insecure passwords. Here's what the password generator in 1Password looks like:

1password-generator

A password generator can create a truly random and hard to guess password

One thing I love about 1Password's generator is that it offers the option to create memorable passwords, like whinny-upswept-inferior-apiary, as an alternative to random strings of alphanumeric gibberish like TouB4kccX_kF7csPW9f9.

Unfortunately, the process of changing your old passwords is labor-intensive. For each service, you'll need to find the page where you change your password; use the password generator to create a new, random, unique password and then update the saved entry.

As a best practice, you should do this as soon as possible for high-value sites like banks, credit card portals, and email and social media accounts. After completing each password change, I recommend that you immediately sign out of the service and sign in again, using your freshly saved password, to confirm that the new password was properly stored.

The final step is to ensure that you turn on 2-factor authentication wherever you can. You should absolutely turn on this protection for high-value sites like email services and financial institutions. Your mobile phone is the best 2FA device, ideally with an authenticator app rather than SMS messages. Just make sure you've got a good backup for your 2FA credentials in case your phone is lost or stolen.

For the most part, finding out which authentication methods are available for a specific site usually requires signing in and then poking around the account options section. Look for anything with the words login or security.

Not sure whether a service supports additional authentication options? Check out the excellent 2FA Directory, an open-source project that maintains an exhaustive list of websites, with details on whether and how they support 2FA. If your service isn't measuring up, and switching is an option, this is definitely the place to start. 

Editorial standards