ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How Safe And Strong Are Your Passwords?

Updated on April 15, 2015

Don't use the same password twice

Keep passwords secure. Write them down. Make a new one for each social network, bank or credit card account so no two places have the same password.
Keep passwords secure. Write them down. Make a new one for each social network, bank or credit card account so no two places have the same password. | Source

Password Guessing

Published 3/23/2014 by Rachael O'Halloran - This is Part One in a series.

So how safe are your passwords?

Do you feel like yours are so unique that no one would ever guess them?

Maybe. Maybe not.

If any of your passwords are the name of person, place or thing in your life, guess what? Your passwords are not really safe at all.

People who use the names of their pets, children, maiden names, married names, street names, city or state names, honeymoon destinations, nicknames and even names of their long lost love have passwords that are the easiest to hack.

If you have a series of numbers after the names, it makes it a little harder to be guessed, but not by much, especially if the numbers are birth dates, birth years, anniversaries, address numbers, present or former phone numbers or any other momentous date.

Common Passwords

If your password isn't in this photo, don't pat yourself on the back yet. Check the lists of common passwords in the sidebar.
If your password isn't in this photo, don't pat yourself on the back yet. Check the lists of common passwords in the sidebar. | Source

Password Strength

The stronger your password, the less likely it will be guessed by a human or a computer program.

So, make it long and make it strong.

A strong password would be a combination of numbers, symbols, and upper and lowercase letters that are in no sequential order.

Question: With that in mind, is this an example a good password choice?

AbCd1234

Answer: No, because it is an alpha numeric sequence following a certain order, even though the usage of the upper and lower case letters is random. Completely guessable.

Question: Is this an example of a good password choice?

Y$9b6#_m2%P&4

Answer: Yes, because this is a totally random mixture of letters, numbers and symbols and not easy to remember. Don't use it, it is just an example.

Your email password

Never use the password you use to sign onto your email on any other sites. If you have one password that you are using for everything, change it now so each site has its own password.

Write them down (on paper) because good passwords are the ones you can't remember. Remember, make it long and make it strong. The longer the better. The more mixture of numbers and letters and symbols, the better.

If the passwords you use now in any way resemble those on the lists located in the sidebar of this hub, change your passwords on every account to something stronger. Once a thief has figured out a pattern to a couple of your passwords, he has access to your life.

If you think you don’t have anything worth stealing from your computer or your accounts, think again. Your identity is just as important to a thief as your Facebook game credits, bank balance or your Paypal account.

Choosing a Password

Your password should never be the name a person, place or thing that is familiar to you or can be associated with you. Even by adding numbers to it, most people still choose numbers that mean something to them, like a birthdate, address, or phone number.

Lots of hackers use "bots" or programs

It will always be a human who benefits from stealing from you, but it may not always be a human who did the actual stealing.  'Bots' and computer programs are cheap, untraceable, and successful especially if your password is easy to crack.
It will always be a human who benefits from stealing from you, but it may not always be a human who did the actual stealing. 'Bots' and computer programs are cheap, untraceable, and successful especially if your password is easy to crack. | Source

The Ingenuity of the Password Thief

Passwords were first implemented so that you can be identified as the rightful person to have access to a certain account. In no way is it a foolproof system, but it is the only system we have at the moment.

That is why it is so important to keep your passwords to yourself and not share them. However, it is advisable to leave them in a safe place for your loved ones to access your accounts if you should happen to die or in some way become incapacitated. I cite that because of what happened with awordlover's account which I also moderate.

Just like there are car thieves who can hot wire your car to steal it, there are thieves who can hot wire your computer to get to your passwords and other information.

Ok, not really, but how they get your information is a similar process.

The thieves who want your password have several ways they can get it and they don’t even have to know who you are, where you are, or when you are online.

Personal Information

It will always be a human who benefits from stealing from you, but it may not always be a human who did the actual stealing.

Primarily this is because "there's an app for that!" There are many computer programs that are specifically made to hack or guess passwords. They need very little personal information for the process to be successful. I feel that these 'bots' should be outlawed; unfortunately they are legal. However, I fail to see their value or worth in a legitimate way.

Guard your personal information just like Fort Knox is guarded.

When you think about what people can do with your name - just your name - it can be devastating. Most of the time, we are responsible for sharing some details of our life appearing online. When we are talking to our friends online, especially on Facebook and other real time sites, we often will mention something about our daily lives, be it the name of our children, where we used to live, where we work, naming an upcoming event at our kid's school, or even what our favorite recipe might be.

How many times have you clicked "Share" on a Facebook post?

It is inevitable to share information on a social site. Something as innocent as sharing a photo for a charity, child or pet abuse, or a disease like breast cancer, adding your own message to pray for someone, or that so and so is recovering from breast cancer - all these things can give a thief valuable information about you, your location and your online habits.

Google yourself often to see what shows up in the results.

You might even be surprised to find one of your Hubpages articles is listed on someone else's website - possibly with their name replacing yours as the author! That is how I found many of awordlover's articles were being copied to other sites.

Look your Google results over and see how easy it would be for someone to locate you.

The results might show site that have your present and past home addresses, the names of your children, their ages, that you have X number of grandchildren who live in (name) state. That you are married XX years to (name) and that you were married in (city). Regarding your activities and what you talk about online, don't give the search engine any more information to add to their database.

Tips & Safety: Choosing Passwords

The Best Passwords

The best passwords make no sense.

Alternate -- using random numbers, letters and symbols with upper and lower case. Write them down and change them often, at least once every three to six months or when you see suspicious activity on your accounts.

If you ever hear news reports that a certain company's database has been hacked or they leaked email address/account numbers, and you have an account there, change your password immediately.

If you get suspicious emails stating that you have to update your account information, do not click. If the email contains any personal information about you, change your password by going putting the URL into a separate browser window/tab, and take care of it from there.

Don't click any links in emails because they will most likely re-direct you to a bogus site (clone) that looks like the company, but it is not.

Passwords are your one single line of defense against internet predators trying to get your information.

Deter a password thief today. Go long.

Write Down Your Passwords & Sign On Information ...

A password thief can change your passwords so that you lose access to your accounts (it happened to me with a blog) and it won't be long before he attempts to divert your direct deposits to a new destination. It happened to me with my Social Security checks.

With my blog, all the thief had to do was go hack the blog's password to get to the Dashboard, kick me out as admin, put himself in as admin, change the password. I tried to get it back via "password recovery" steps to get the password to get onto the Dashboard, but the link Google sends went to his email because mine was already off the blog by that time. He then cleared out every post I made over 3 years life of the blog. I have copies of my posts and the cache copies are still in search results, but Google wouldn't remove him as admin because I couldn't prove ownership. I asked for the blog to be closed down for stealing my content, and the answer was no because there was no content to steal. It was not showing on the blog; he deleted it. I asked for blog to be closed down because he impersonating me. The blog had my name in the title. And they agreed. The whole blog is gone but now neither of us have access to it. My family wants me to start another blog in the future, but I doubt it. With Hubpages theft being so high on the internet, it is becoming the Wild West of the 21st century. I don't know if I want to add one more thing to be on my guard about.

But, my Social Security check was a different matter.

Like most people, my Social Security check goes direct deposit to my bank account. There was no option to have it mailed to me. I was told that direct deposit was a requirement. My husband and I keep one joint bank account for paying mortgage, car payments, etc. We keep separate "his and her" personal accounts. My account pays most of the frills (decorating, shopping, online purchases), his account pays for all the thrills (vacations, our hobbies, Saturday night dates).

As smart as I thought I was, I kept a Word document of all my passwords on a file in my computer, instead of on paper in my house.

It listed my secret questions, passwords, screen names, anything I had trouble remembering was in that Word file. I even emailed passwords to myself every time I changed one, so I would be able to find them easier and to copy paste them onto the list to update it.

Emailing passwords to yourself is the worst thing you can do. Think about that for a second and you'll see why.

The thief was able to get most of what he needed from the emails I had sent to myself and my husband. But he was also able to get the Word document I kept in a file because I emailed it to my husband as an attachment to an email so he would have the info in case he ever needed it to get into our online credit cards and bank accounts.

This was after I took over awordlover's accounts last year; I thought it was a great idea that she left all her info behind in a notebook for her husband and sons for when her time came. I just skipped her notebook advice and made the Word document instead.

It was a very bad idea.

The thief had everything he needed - the answers to my security questions, my bank account number, my social security number from the bank account info. Via the online form, he notified Social Security to change the direct deposit of my check to a bank in Miami, Florida, he put a change of address in with the US Post Office for a drop address (an address that has no building or is an abandoned building), so only mail with MY name on it was changed from my present address in California to Miami, Florida. He cleaned my personal bank account out to put the funds in the Miami bank and then closed my California bank account. All this happened within 5 days.

It took me over 6 months to get my Social Security check straightened out. In that 6 months, the thief had all the mail in the Miami forwarded to another drop address in St. Thomas in the Virgin Islands. It skipped around the islands for a few months until it landed in Bangor, Maine.

My accounts went to more destinations that my husband and I ever did when we traveled across the country. The initial process was all done while I was working a 8 hour shift. It took me 5 days to realize what had happened.

After the 6 months, the hacker abandoned the account in Bangor Maine and emptied it out by wire transfer. The horror of it all, he was never caught.

Thieves never leave a trail for anyone to trace activity directly back to them. The guy who did this bounced off so many IP addresses and servers, that he is in the wind and the authorities said they will never catch him. After they told me he was untouchable, they told me it was all my own fault because of the Word document.

When I say write it all down, I mean on paper, to keep in your house, office, or safe.

Write down your passwords and secret questions on paper, along with your sign on names, screen names and account numbers, DO NOT store them on a Word Document on your computer.

As with me, all a thief has to do is access your email, and it will be no time at all before he has access to every part of your life.

Suspicious emails?

If you get one or more emails that contain hints of your private information, you may have already been compromised. Always change all your passwords whenever you get suspicious emails. Make each one different, write them down.
If you get one or more emails that contain hints of your private information, you may have already been compromised. Always change all your passwords whenever you get suspicious emails. Make each one different, write them down. | Source

Security Questions

Do you have the same security questions on every account? Yes?

The problem with security questions is that people choose something they themselves (or immediate family) will remember so they don't have to play hit and miss to guess what the answer is.

What city were you born in?

All a thief has to remember is "Oh, she has it listed on her Facebook profile. It's Detroit."

The security questions you choose to remind yourself of your password or to verify your identity could be your undoing.

Try changing them (questions and answers) every few months so that the same questions are not on the same account forever. Also, try giving the wrong answer for what city you live in or other questions. Choose something you will never remember.

What's your mother's middle name?

Pick a male name that is not familiar to your family. For example: If no one is named Sebastian, you could choose Sebastian but then add a series of non-sequential numbers after it, if the space allows numerical input.

On your bank information for example, one of the primary questions they almost always ask is what city were you born or what city were you married in as a security question. You can pick a fantasy destination you always wanted to travel to, and use lower and uppercase letters to type it out. If the field allows you to insert numbers or symbols, add them. If the city has a slang name, write that down instead of the city's actual name.

Example: Windy city, Mardi Gras, Philly, Tinseltown, Motor City, Chocolate Town, etc. If you grew up in a section of a city, try using that. Example: Flatbush, Kensington, East side, Jackson Heights, Prospect Park, etc.

Sometimes one of the choices is for your middle name or maiden name or that of your mother or grandmother or sister. You'd be amazed at how much information about yourself is available online. Did you list your relatives in the family boxes on Facebook? Mother, father, sister, brother, etc. Also, if you ever wrote a personal hub, mentioned family members by name, their illness, their new home, the honeymoon, your children, their birthdays - a clever password thief can get all of that info if he enters your name in a search on Google.

If a site allows you to pick your own security questions, be creative. Pick something more obscure. What was my Uncle Harry's second born son's name? Or, What personal nickname does my hubby have for me?

Picking the name of the street you lived on as a kid is popular and not a good question to choose. Here is a good example. Enter your name in the Public Records box of Peoplefinders.com

All anyone has to know is what city you lived in at that time and they can Google it with your name and get more information. If you still have family living there, the phone book is their best friend.

Here are the results using my name and California in the search boxes: You will see that the results give you a list of alternate names that might be in use, an approximate age so you can tell which person might match the Rachael O'Halloran you are looking for, a list of former city and states, and possible relatives who live or have lived with me.

On peoplesmart.com, privacy protection doesn't get much better. The link shows all the names for Rachael O'Halloran, aliases or former names, and former addresses. For a 3 day trial price of 95 cents, someone can do as many searches as they want for 3 days (or $25 a month) and do serious damage to a lot of people with the information on that site and many others like it. And it is all public record.

Due to what happened to me with my bank account, one of my security questions is "What am I going to do to the bastard who ever steals my passwords again?" The answer allows me 26 characters and unless the thief has had nightmares about someone doing these things to him, he won't get the answer. I change the answer every month.

If your bank requires you to use your account number (instead of a screen name) to sign in to their website, then it is triple important that your password and security questions be the most difficult ones to guess. Because most people bank in their own neighborhood, your bank and bank account number can be located very easily. By knowing your birth city, your maiden name, (as per the public record links above), your favorite color or your favorite flavor ice cream, (from sharing that on Facebook or other social networks), the answers to your security questions can be guessed with little effort.

If you are easy to find, getting into your accounts won't be hard at all.

WiFi

Connect carefully
Connect carefully | Source

Cybercafe Safety

Wifi is convenient but you need to exercise caution while using, and also when you are leaving.
Wifi is convenient but you need to exercise caution while using, and also when you are leaving. | Source

Wifi, Library and cybercafes

If you use computer libraries or cybercafes, these are not secure computers. Only use them if you absolutely must. Never look up your credit card or bank information. You don't know if there is a keystroke logger or malware that monitors the activity of every person who uses the computers. It could have been placed by the owner or anyone else and you can't see it.

If you are accessing your email, take a look at your login activity since your last access and make sure it is only the places you have logged in.

When you are leaving that computer, clear the cache - totally wipe out your browsing history so the next person sitting down cannot see what you were doing, or try to access those sites with any saved information (cookies, etc.). If you must write anything down, use your own paper and not post-it note pads that are sometimes available. What you write can be seen through to the next paper.

Completely log out of every page you opened. Never save passwords on the screen prompts.

After you leave, change your password as soon as possible. Don't change it on their computers.

When I had to use library computers or cybercafes because we were on the road traveling from east coast to west coast, I changed my password as soon as I got back in the car by using the browser on my cellphone. I didn't use my cellphone for answering emails because of the volume, airtime cost, and the fact that my fingers couldn't handle the volume of email that needed responses.

If you are surfing for hotel availability for the next stop in your travels, do not put in credit card information to hold the reservation. If they insist, tell them you are on a public computer, tell them your arrival time and you will supply the information at that time.

If you use WiFi, which is often available at hotel destinations, cybercafes and restaurants, you need to do routine maintenance on your computer as soon as possible. Here is a link with more tips.


Safety Tips: Bank

Establish limits so if one purchase goes over your limit, you will be notified.
Establish limits so if one purchase goes over your limit, you will be notified. | Source

PIN number joke

this is funny. click to enlarge.
this is funny. click to enlarge. | Source

Disclaimer

While I am fully aware the information in this article can be used in the wrong way, this author advises all readers to use the information responsibly.

Tips for Offline Safety

I require my bank to call me on the phone every time a major change is being done on my account.

Even if I am on vacation, and I've used my bank credit card or wrote a check a minimum of two times at the vacation spot, they have to call my cell to see if it was me. If I write a check from the vacation place, they call me saying that a certain merchant or establishment is trying to cash a check I wrote for $XXX.XX and did I write it? Also, if any changes are made to the account logistics (change of password, my address, redirecting my direct deposits, etc.). they call me even if I did it myself. I also get an email notification as part of a two step verification. Any time a company offers a two step verification, take it!

Establish a Purchase Limit.

This is not how much your line of credit it. This is a limit you decide that you want to bank or credit card to notify you about if someone spent this much or more for one purchase with one merchant. It is a red flag to you. If you never spend above $1000 at one time for a purchase, then that would be a good Purchase Limit to put on your account. Since I rarely buy any one item that cost $1000 or over from one merchant, I informed my bank and my credit card companies that any purchases that exceed $1005 should follow the two step verification.

Get your bank and all your credit cards to do the same for you.

Tell them you want a "STOP" put on the account any time your credit card is used a minimum of two times in a state (or zip code) that is not your own. This means that the third time the card is being used, the merchant will decline the card at the point of purchase (and hopefully get someone on camera!). If the bank or credit card company is able to locate you to verify it ahead of time (in case it is truly you doing the transactions), then the third merchant won't decline the card. The good thing about this is when my husband and I are on vacation, I almost always forget to call the credit card companies to tell them there will be new activity in a place other than home state. It is just something I don't remember to do. By the time I get to the third merchant who declined my card, I remember, so I have to call them to let them know it was me making the transactions and that it is all ok.

PIN Numbers.

I have separate pin numbers on all my credit and debit cards and I am required to enter them even to make a purchase in Walmart. Whomever steals my credit cards (or steals just the number) has to have the PIN for that particular card to be able to use it - online or offline. If you have a debit card, chances are you've had the same PIN number forever. Change it every 3 to 6 months and write it on your list of passwords and security information.

If this seems like a lot of trouble for you to go through, you only have to have someone invade your privacy one time, and you won't think it is a lot of trouble anymore.

  • Write everything down so your family members have a "go to" list in case anything ever happens to you.
  • Keep a small notebook just for your passwords.
  • Assign one page for each site listing the passwords and the security questions with the answers that you chose for that site.
  • Change it up every few months.

If you can remember your password and the security answers, you are not operating in a secure environment.

Cool Site: Try This Password Checker!

Go to this link - How Secure is My Password. Enter ONE password (repeat for each password you have, one by one for each account.)

The result will tell you how long it will take someone with a Desktop PC to crack your password.

However, because I'm suggesting this as an educational tool for you to see how good your passwords are, I do not recommend using the Password Manager Form that is also offered on that page.

I prefer you to do it long hand, in a small notebook from the dollar store, and keep it safely in your house, not online.

Below this paragraph are 3 screen shots to show you what to expect and what my results were using the "Good" password from the example above: Y$9b6#_m2%P&4

1st is the landing screen for you to enter each of your passwords one by one.

2nd is a screen shot of my results.

The 3rd screen shot shows what you will see when you unhide the results to see the number of possible combinations. You want to see VERY HIGH numbers on that part.

These are screenshots. To test your password strength, click link under screenshot

This is a screenshot for demonstration purposes only. This is the first screen you see. Go to link and test your password.
This is a screenshot for demonstration purposes only. This is the first screen you see. Go to link and test your password. | Source
This screen tell you how long it would take a person using a Desktop PC to crack the password. This is my result
This screen tell you how long it would take a person using a Desktop PC to crack the password. This is my result | Source
Click SHOW DETAILS and you will get this screen telling you of the possible combinations of your password.
Click SHOW DETAILS and you will get this screen telling you of the possible combinations of your password. | Source

Making Good Password Choices By Google

Thanks for not copying my work.

Do Not Copy, Thank you
Do Not Copy, Thank you

© Rachael O'Halloran. March 23, 2014. All Rights Reserved.

No part of this article may be reproduced without prior permission from the author. Use the following link to refer to this article. Do Not Copy. TYVM

http://rachaelohalloran.hubpages.com/hub/How-Safe-Are-Your-Passwords


© 2014 Rachael O'Halloran

Comments

Submit a Comment

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 23 months ago from United States

    Hi Atz, Unfortunaely, phone numbers are the norm anymore, and it is one of the worst things to do. Sometimes the field is alpha numeric which means the user has to include at least one alpha letter of various types (capitalized, lower case) or a symbol in order to continue using the phone number. If you lose the phone number in any way (change of number, cloned phone, hacking), your phone number gives carte blanche to anyone. Definitely not a good idea. TY for bringing this to readers' attention. :)

  • Atz profile image

    Athul M R 24 months ago from Calicut, Kerala, INDIA

    There are many, who uses their phone numbers as passwords for Wi-Fi networks, which makes it very easy to crack

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 2 years ago from United States

    poetryman6969, thanks for reading and commenting.

  • poetryman6969 profile image

    poetryman6969 2 years ago

    I still see folks sharing pass words now and then. I think it's a bad idea. Especially with folks who feel no need to responsible like kids.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #xmags

    Hello there! I'm glad you had some fun with that great website and saw the need to change your passwords.

    Thank you for reading and thank you for your compliments.

    Rachael

  • xmags profile image

    Xeng 3 years ago from Philippines

    Awesome article! Had fun with the how secure is my password website. HEH. Good job on this hub. Changed my passwords immediately after reading this!

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #Chinaimport

    Any online application or program can be hacked with the best of them, just look at the reports of databases from businesses like credit card companies and department stores. So I always suggest that a physical notebook is best.

    Thank you for reading and commenting,

    Rachael

  • Chinaimport profile image

    Kamal Mohta 3 years ago from Guangzhou

    Passwords are tricky. Use an easy one and anyone can guess it. Choose a hard one chances are you can’t remember without a physical record in a notebook. I am currently using LastPass to manage all online passwords, but keeping records in a notebook is a time tested method.

    Thanks for sharing your views.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #Technogala, I'm glad you see them and have the chance to correct them. Thanks for reading, commenting and following me. :)

  • Technogala profile image

    Technogala 3 years ago

    Very informative hub!now only i realize some of the password mistake i already did in my life..

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #Karanja Joseph

    I'm glad you found the detailing of my article interesting. One only has to get their identity stolen once to realize the devastation it can cause. Thank you for reading and for your comment.

    Rachael

  • Karanja Joseph profile image

    Josep 3 years ago from Kenya

    That's a detailed analysis of passwords and risks associated with taking our passwords casually. I especially liked the statement, "Once a thief has figured out a pattern to a couple of your passwords,he has access to your life". Very indeed. They keep data of an account for a long time and rip it apart when it is ripe with finance.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #DDE

    I'm glad you found some useful tips here. Thank you for reading and for your comment.

  • DDE profile image

    Devika Primić 3 years ago from Dubrovnik, Croatia

    Great write up here about passwords and you mention with such importance. Information that shows many how to choose their passwords and I too have learned from here.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #teaches12345 - with so many people clever at these things and with many programs on the internet on how to hack passwords, it's best to make them as difficult as possible. Most hacking programs give up if passwords are 12 characters or longer. I make mine as long as each site will let me. Some sites allow 16 characters, some allow up to 30 characters.

    Thank you for visiting and for your comment.

  • teaches12345 profile image

    Dianna Mendez 3 years ago

    This is great advice. I try to make mine strong, as you suggest.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #vkwok - Thanks you for reading.

  • vkwok profile image

    Victor W. Kwok 3 years ago from Hawaii

    This is an awesome hub. Thanks for sharing.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #Alfin Loencontre - thank you for reading my article. I hope you'll check out the one I wrote on Malware.

  • Alfin Loencontre profile image

    Alfin Loencontre 3 years ago

    Excellent work, having read this information does not need to know anything more to keep your password secure.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #bravewarrior

    It's not been an easy last ten years. but with each experience I have learned something, but I would have rather learned the lesson less expensively. lol After the incident about keeping Word documents, I of course made the notebook but I also saved everything that I needed to a flash drive - where I store my info to have as I need it - no way to get into those from a computer hack. I saved all my programs that I use all the time to another flash drive. Then I restored my computer to factory issue to wipe out anything left on the hard drive (monitoring software, keylogger, etc). It was like getting a brand new computer. All I had to do was re-install the programs I wanted from my backup flash drive - no more downloading - and I was all set. Your process as you describe it is exactly the right way to do it. I hope you pass it on to your children and friends and other family members because this can be devastating in more ways than one if it happens to them.

    Thank you for reading and commenting,

    Rachael

  • bravewarrior profile image

    Shauna L Bowling 3 years ago from Central Florida

    Wow, Rachael you have had some horrible things done to you! I have all my username/passwords written in a notebook. I'd thought of recording them in a Word doc but thought better of it in case my computer is ever hacked. I keep the information for my creditors written inside the physical file folders where I store my paid bills.

    This is a great hub. Very thorough and informative. Hopefully you'll have lots of reads and be able to save someone from catastrophic theft.

  • profile image

    Phoebe Pike 3 years ago

    I probably will be back.

  • RachaelOhalloran profile image
    Author

    Rachael O'Halloran 3 years ago from United States

    #Phoebe Pike - thank you so much! I'm working on a couple more hubs. I hope you'll stop back to read them too. Thanks again!

  • profile image

    Phoebe Pike 3 years ago

    An awesome hub on security. You did a great job.