This article is from Trend Micro.
Visiting some websites may need you to sign up and register your own account so you can access their pages. Aside from using your Google or Facebook account, they need you to create one with your email address with a unique password.
One common mistake among users is they constantly use the same password for all their accounts. A Google survey found that at least 65% of people reuse passwords across multiple, if not all, sites! So, if one of their account gets leaked, their other accounts may also be affected.
1. DO NOT USE letters and numbers in sequence (examples are qwerty, abcde, 12345, asdf). Sometimes we have a mental mechanism that we use what’s readily available.
2. NEVER use your birthdate. We know it is easy to remember, but it will also be easy for others to crack your password, especially if your birthdate information is available online.
3. COMBINE letters, numbers and symbols that at least has eight characters. Having different combinations will make your password tougher to crack.
4. REFRAIN using your name. Some websites have this kind of catch error to prevent you from using a part of your name as your password.(“Eva” and “Alex” are the most common names in passwords.)
5. LESSEN using any of your related information. Cyber thieves can easily check these details online. Steer clear using your family members’ name and birthday, pet name, address or hobbies.
6. AVOID using common passwords. Such abused ones are P@$$w0rd, password, 1234567890, ioveyou, etc.
7. STOP reusing your passwords. Every time you create a new password, do not use previously used and similar passwords from other accounts.
8. STRONGER passwords can also be a long passphrase where you combine multiple words into a long string of at least 15 characters (ex: correcthorsebatterystaple, randommousebottlepickle)
9. REFRAIN from changing just one digit whenever you update your password every 60-90 days. (ex: MyG@laxyPassw0rd01, MyG@laxyPassw0rd02, MyG@laxyPassw0rd03)
10. USE a Password Generator and a password manager. Do not store them in notepads and sticky notes.
A recent survey found that 91% of respondents claim to understand the risks of reusing pass-words across multiple accounts, but 59% admitted to doing it anyway. This is why compromised passwords are responsible for 81% of hacking-related breaches, according to the Verizon Data Breach Investigations Report.
Your password choices are your first line of defense against hacks and cyberattacks. It is up to you if you want your account to be easily compromised or securely protected. Create a best guard to strengthen your passwords.
You can try and check Trend Micro Password Manager. It helps you manage all your online credentials in one secure location, ensuring an easy and safe online experience, as well as a faster, more secure, and convenient way to access web sites.
It has features like the Password Generator that helps you create strong passwords in seconds and Password Doctor that checks for weak or duplicate passwords.
It also provides in-the-cloud synchronization across multiple devices and operating systems, including Windows 10 and Mac desktops and laptops, as wells as iOS and Android smartphones and tablets, allowing users to conduct secure online transactions while in the office, at home, or on the road. Click on the button below to give it a try:
Have you fallen for a hoax, bought a fake product? Report the site and warn others!
As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact. If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at competing websites (that you trust). If the difference in prices is huge, it might be better to double-check the rest of the website. Check Out the Social Media Links Social media is a core part of ecommerce businesses these days and consumers often expect online shops to have a social media presence. Scammers know this and often insert logos of social media sites on their websites. Scratching beneath the surface often reveals this fu
How do I recover my crypto after it’s stolen? What happens if your crypto wallet is compromised? Can stolen crypto be traced, and can police actually recover crypto in 2026? These are the questions most people ask within minutes of realizing their wallet has been drained. Crypto theft is fast, quiet, and unforgiving. By the time most victims notice something is wrong, the funds are already moving across the blockchain. Once seen as a problem for exchanges and whales, crypto theft now heavily affects everyday investors. Phishing links, fake support chats, wallet approval scams, SIM swaps, and malware attacks have become common. Knowing what recovery realistically looks like—and what it doesn’t—can prevent panic, bad decisions, and costly follow-up scams. In a Nutshell Crypto recovery is possible, but only in limited situations Blockchain transactions are irreversible, but stolen crypto can still be traced Speed and documentation matter more than optimism Police and exchanges play a bigger role than private recovery services Guaranteed recovery offers are almost always scams Is it Actually Possible to Recover Stolen Crypto? Yes, crypto recovery is possible, but only under specific conditions and rarely through direct action by the victim. Blockchain transactions are final by design. Once crypto is sent and confirmed, it cannot be reversed. There is no central authority, no chargeback process, and no technical “undo” button, even if the transaction was clearly fraudulent. This is where many people ask whether stolen crypto can be traced. In most cases, it can. Every transaction