A community-oriented approach with a progressive editorial stance, striving for transparency and encouraging readers to consider multiple perspectives.

Saturday, May 17, 2025
booked.netCall us at 613-935-3763
Eco-conscious : Print an issue, plant a tree! 

No products in the cart.

  • About
    • Contributors
    • Disclaimers
    • Terms & Conditions
    • Giving back
    • Mission Statement
    • Past Issues
    • Where to Find
    • Call us at 613-935-3763
The Seeker - Positively Local, Suporting Local
  • Home
  • News
  • The Soapbox
  • Columnists
  • Events
  • Advertise!
    • Online
    • In Print
  • Puzzles
  • Videos
Seeker
No Result
View All Result

Why Strong Passwords and 2FA Are Non-Negotiable in 2025

Jason Cardinal by Jason Cardinal
February 3, 2025
in Science & Technology
Reading Time: 4 mins read
0
Chain-locked book, phone, and laptop symbolizing digital and intellectual security.

Data breaches are now a regular occurrence and make great news.  Increasingly, municipalities, utilities, and government, are being breached and held hostage for ransom, hence the term ransomware.  It turns out that many newsworthy data breaches weren’t due to a sophisticated hack (some were), but rather to a disgruntled or recently dismissed employee. One with access to sensitive network or administrator passwords.  Or one who picked up a nefarious USB stick in the men’s washroom and stuck it in his computer’s port hoping to find downloaded movies or someone’s saucy vacation photos (think Stuxnet.)

As a cybersecurity evangelist, it surprises me more than ever how little many tech savvy people are still not practicing good online hygiene especially with their password practices.  I’m not talking about deleting your cookies when you browse the web or disabling your “app tracking” functions on your smartphone.

You might also like

The Double-Edged Sword of Technology: Are We Advancing or Regressing?

Top Laser Engravers and Cutters for Your Projects

Lawrence Krimker: 5 Investing Philosophies for Success

Many of us blindly enter our credit card information to go past a news site’s paywall so we may continue to consume more Orwellian tech news.  We’re in such a rush, some of us even allow browsers such as Google Chrome and Microsoft Edge to store our private passwords online for us.  When signing up to a new online subscription we often use a password we’ve memorized. Sometimes we’re informed that the password we tried to use wasn’t strong or complex enough.  So, we write it down on a Post-it note and add an exclamation point or a dollar sign at the end of it and voilà our password is now supposedly secure.

Use strong passwords

According to security behemoth Kaspersky, 59% of passwords can be cracked in an hour.  That’s almost 6 out of 10 passwords.

A strong password is one that is at least 12 characters including capital letters, lower case letters, numbers, and special characters.

Examples of strong passwords include FJia0$1r08ja4!!0s or 50sfjjRis0#ps6J.  Some password phrases can also be effective like T0y0t@coRRola$15MyFaveAutt0mobilE.

Never reuse or share your password

Never share your passwords with neither friends, family, nor co-workers.  Gently inform your friends to purchase their own Netflix subscription and inform your family to let you know what they’d like you to order for them on Amazon rather than let them access your account and do their own online shopping.

Amazon facilitates this by letting you create various user profiles with their own credit card information.  Amazon doesn’t require 2FA or MFA.

Turn on 2FA or MFA everywhere

2FA, short for “2-factor authentication” and MFA, short for “multifactor authentication” is a second layer password protection method which is free and becoming increasingly mandatory on some websites.

The way it works is when you enter your username and password on a website, a code is sent to you by another means to ensure the user is indeed you logging in.  That’s right, you enter your username and password, and you receive a 6-digit code via text message to your smartphone or to a different email address than the one you used to register your online account.  These codes are usually valid for two minutes.

Even more secure than sending a text message to your phone or to an email address is to use an authenticator app.

Use an authenticator app

I use both Google and Microsoft’s Authenticator apps.  These apps are free and easily downloadable from the Apple Store (if you’re using an iPhone) or Google Play (for those using Android devices.) 

What makes authenticator apps more secure is that the device the app is installed on is registered to the app.  This ensures you’re holding your device when logging in and waiting for your 2FA code. 

This is important because the technology used to send you a 6-digit app via SMS text messaging is now much more easily hacked nowadays.  Your authenticator code is only valid for thirty seconds and ensures you’re holding.

In my next article, I’ll explain the benefits of password managers and passkeys.  Thanks for reading and let me know if you have any questions by posting a comment below.  

Jason Cardinal

Jason Cardinal

Jason Cardinal, CISSP, is a bilingual GenX’er with 20+ years in tech and cybersecurity. He holds clearances from the RCMP, Hydro Québec, OPP, Sûreté du Québec, and U.S. Homeland Security. A volunteer, half-marathoner, martial artist, and guitarist, Jason earned his CISSP in 2023 on his first try. He offers lectures and training sessions.

Next Post
person touching white spiral notebook

The Future of Payments: Exploring SWIFT Business Pay in a Technological Era

Categories

  • Business & Finances (15)
  • Columns (609)
    • Archived (113)
      • Filter-Free Zone (9)
      • For What it's Worth (36)
      • Fostering Change (2)
      • Memo from the Mayor (2)
      • Men Writes (25)
      • Mortgage Tips (1)
      • Seeker Snippets (22)
      • Take Note (6)
      • Which Witch is Witch? (10)
    • Current (374)
      • Appreciating Contemporary Art (1)
      • Discover SD&G (34)
      • Fashionably Marlene (12)
      • From Sharyn's Pantry (6)
      • Gardening – Ask Anna (26)
      • Grant Spills the Gravy (10)
      • Jay's Tech & Cyber Insights (3)
      • Keeping it Reel (27)
      • Local Spins from Bud's Records (9)
      • Louise Mignault (58)
      • Mental Health Matters (9)
      • Out and About (50)
      • Outdoor Club (22)
      • Reality Bytes (8)
      • roadSIGNS (30)
      • Smart Move with Sondra (2)
      • The Resilient Life (5)
      • Transition Cornwall+ (15)
      • What I'm Reading (2)
      • Wondrous Life (32)
      • Yafa Arts & Craft (20)
    • Friends of the Cline House (1)
  • Douris Deliberations (5)
  • Health & Fitness (10)
  • Home & Garden (11)
  • Interviews (156)
    • 5 questions with… (106)
    • Business Profiles (1)
    • Locals in the Loupe (47)
  • Leisure & Lifestyle (736)
  • News (2,535)
    • Ontario (1)
  • Politics (24)
    • Federal Elections (10)
    • Provincial Elections (10)
  • Science & Technology (46)
  • Sports (2)
  • The Adventures of D.B Cooper (1)
  • The Soapbox (255)
    • Agree to Disagree (114)
  • This May Also Interest You (1,536)
  • Travel (52)
  • You May Also Like (965)
Facebook Twitter Instagram Youtube TikTok
Don't miss anything!

Get notified of all our new news by ringing the bell at the bottom left corner!

Content Safety

HERO

theseeker.ca

Trustworthy

Approved by Sur.ly

2024
Disclaimers
Stock Photos partially provided by our partner Depositphotos
The Seeker Newspaper is located at 327 Second Street E., Cornwall, ON K6H 1Y8 -- All rights reserved
The Seeker does not accept responsibility for errors, misprints or inaccuracies published within.Please note that the views and opinions expressed in news article are solely those of the authors and do not necessarily reflect the official policy or position of The Seeker. The content provided is for informational purposes only and has been written from the authors’ perspective, aiming to engage and inform readers. The Seeker is committed to presenting a wide range of viewpoints and encourages readers to conduct their own research and exercise critical thinking when considering these opinions in the context of their own perspectives.
ISSN 2562-1750 (Print)

ISSN 2562-1769 (Online)
No Result
View All Result
  • Home
  • News
  • The Soapbox
  • Columnists
  • Events
  • Advertise!
    • Online
    • In Print
  • Puzzles
  • Videos

© 2023 Reducing our footprint!   For every issue we print, we plant a tree!

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.