Personal Security Issues and Best Practices
in the Digital
Age
Published Wednesday, October 01, 2025 at 05:00:00 PM EDT
Authors
- Ben Carpenter - Introduction, Password
Security, Password Generator, and Conclusion
- Wentao Yu -
Phishing and Phishing Detection Challenge
- Zihan Li - Data
Security and Data Breach Cascade Simulation
|
Table of Contents
|
Introduction
Password security is essential in modern society. Of the growing number of data leaks
each year, many are simply due to weak passwords. Google reported a staggering 47.2% of
the breaches recorded by its Cloud Security division in the first half of 2024 resulted
from weak or missing passwords.[1]
This is a serious concern, as any one of these breached databases can contain sensitive
information about you. In this article we will explore three main points:
- Password Security and how you can make better passwords and store them safely
- How Hackers can use deception to get your information and passwords
- How even secure passwords can sometimes be breached and ways to monitor for that
Password Security
First, let's look at password security. Conventional wisdom suggests that a secure
password should be at least 8 characters long and include at least 3 of the following:
- Lowercase Letter
- Uppercase Letter
- Number
- Special Character/Symbol
While this is true, there are other factors to consider. This practice, alone, can
actually lead to the creation of passwords that are easier to guess. For example, passwords
like “password1234!”, or “[Dog's Name]1!”, fit these criteria, but are much less secure as
we increasingly live our lives online. That social media post 5 years ago about your new
puppy all of a sudden gives a hacker the name of a pet that you might use in your passwords.
So, you can just use a random password generator, right? While these tools are very
useful, they also have their drawbacks. One drawback is that these “random” passwords
almost certainly are not completely random. Computers are systematic by their very
nature, for this reason, they cannot be completely random, but pseudorandom. This means
that, while they appear random, they were produced by a programmatic approach, and as
such can be replicated by a similar system.[2] Cloudflare, a major web hosting and DNS provider,
has found a way to make their generation of random security keys for their customers. By
using a wall of lava lamps, they can produce a set of random data to use in their
generation process. This, in turn, makes their security keys more secure.[3]
Since most people do not have a wall of lava lamps or the tools to turn it into a random
password, what can a normal person do to create a secure password? One solution is to
use a passphrase, a collection of words that don't typically go together. Taking that
phrase, you can then substitute out some of the letters with symbols and numbers. xkcd, a comic by Randall Munroe,
illustrates this idea.

You can see what this would look like by using the Password Generator. We created it to
use a collection of words (using pseudorandom selection), then substituting letters with
symbols, numbers, capital letters, and sometimes even similar looking lowercase letters
to create a more secure password. While this is still not the most secure option, it is
more secure than a random generated 8-character password with most generators.
While this is a good first step, most people have many accounts, making it almost
impossible to remember a different secure password for each one. A secure password
manager can solve this problem. In a 2023 study, 55% of respondents without a password
manager reused their passwords, whereas only 11% of password manager users reused their
passwords.[4] Repeating passwords
on multiple sites is never a safe solution.
When looking for a password manager, there are some things to keep in mind. It should:
- Encrypt Your Passwords
- Only Decrypt them Locally (on your device)
- Use multiple layers of security (i.e. Username, Password, Encryption Key, and
two-factor/multi-factor authentication)
- Have a good reputation for disclosing data breaches if they occur
Such a manager will allow you to reduce the number of passwords you need to remember to one,
while giving you convenient access to your secure passwords. There are many good solutions
on the market. A couple of examples are
1Password and
Proton Pass are two examples, there are more.
Another step to securing your logins is through the use of two-factor/multi-factor
authentication (2FA).[5] 2FA helps
secure your logins, but some 2FA methods are more secure than others. 2FA using your
phone number is not very secure, as there are multiple ways around this (Veritasium has a
video showcasing some of the methods used for this). A much stronger 2FA
method is one that requires no communication with the site you are trying to log into.
This method uses a security key. Security keys are basically math problems that are
stored on a device or in an app. This math problem has a variable for time, and it makes
the number change about every 30 seconds. This is more secure because the only time the
key is transmitted is upon set up, making it very difficult to intercept. When it comes
to storing that security key, there are many apps available, but you want to look for a
few things, including:
- Make sure it is not the same provider as your password manager
- Don't store your password to your authenticator in your password manager (Memorize
it)
- While a completely offline solution like Google Authenticator is more secure, if you lose your
device, you will also lose access to your accounts. For this reason, a solution that
syncs between multiple devices works better for most people.
An example of a couple of ones that sync securely are
Ente Auth and
Proton Authenticator
One more thing to consider is keeping up with potential breaches of your data. You will
almost certainly have some information compromised, but you can keep up with any
breaches that occur. One site, Have I Been Pwned, will allow you to search your email to see
what breaches it has appeared in and the breached site from which it came. Developed by
a security researcher for Microsoft, it will also allow you to set up e-mail
notifications for future breaches involving your data.
Phishing
The second thing we want to look at is phishing, a fraudulent attempt to obtain sensitive
information by impersonating a trustworthy source. This is often done through electronic
communications, such as texting or emails. While many users are aware of phishing, these
attacks are growing increasingly sophisticated, making them more difficult to identify.
In a 2024 report from KnowBe4, 34.3% of users without training failed to identify
simulated malicious emails, which highlights a critical gap in cybersecurity
skills.[6]
The difficulty lies in the deceptive tactics used. Attackers’ slight-of-hand tactics,
including slight misspellings in domain names (e.g., "amazn0.com"), create a false sense
of urgency, and use carefully crafted links that appear legitimate at first glance.
Simply telling users to "be careful" is often not enough, as recognizing these subtle
red flags requires practice. This is why we have developed the Phishing Detection
Challenge, an interactive training tool designed to address this issue directly.
Rather than relying on passive learning, this quiz uses a hands-on approach where you are
presented with realistic scenarios. You must decide whether each email is safe or a
phishing attempt. The core of this learning method is the instant feedback provided
after each choice, explaining the specific signs of a malicious email or confirming the
characteristics of a legitimate one. This provides a safe environment to make mistakes
without real-world consequences, reinforcing the knowledge needed to identify threats.
The goal is to build practical skills and confidence, empowering you to better secure
your digital life.
Data Security
The third area we want to discuss is data security. Protecting your data from unintended
access is another essential part of protecting your digital footprint. Even with strong,
unique passwords and good phishing awareness, your accounts can still be at risk of
leaks and abuse if you do not protect your data across all your services.
Keep these things in mind when you think about data security:
- Use a unique password for every account and password manager
- Turn on two-factor/multi-factor authentication (2FA) whenever possible
- Limit the amount of personal information you share online
- Keep track of where your data is stored and watch for breach notifications
Data breaches take place regularly. Attackers often use a technique called credential
stuffing – trying a stolen password on many other sites. In this way, a reused password
can rapidly turn into a domino effect of compromised accounts. For example, a password
stolen from a shopping website may also get access to your email, social media accounts,
or even banking accounts. This is why using the same password on multiple sites is so
dangerous: Your security is only as strong as your weakest account.
To illustrate this, we created the Data Breach Cascade Simulation. By typing in a
fictional email, you can get a sense of how one leaked password might impact your
accounts on popular services like Amazon, Facebook, Twitter (X), Netflix, Instagram,
Google, Steam, and your bank. We set Amazon to be the original breach to illustrate how
attackers commonly go after high-value providers first. This illustrates the gamble of
reused passwords.
Each account can be seen as a lock on some portion of your data. When all locks have the
same key, one stolen key opens all doors to your information. By giving each of your
accounts a strong, unique password and communicating information cautiously, you improve
the strength of your internet-wide presence.
Conclusion
Data threats are a frightening reality in today’s world, but while threats to your
digital security continue to grow, you can take measures to prevent your involvement.
You can be proactive in securing your accounts and information by using the tools and
advice/activities in this article. Developing better security habits is an essential
step in securing yourself in the modern age. For convenience, the resources linked in
the article above are included below as well.
- Password Managers:
- Authentication Apps:
- Breach Monitoring:
- Other Information Provided In The Article:
References