- Don't start with a real word
- Use every kind of character allowed (uppercase, lowercase, numbers and symbols)
- Longer is stronger
- Use a variety of passwords across different services
- Avoid repeating patterns or combinations of neighboring keyboard symbols
Computer security engineer Steve Beaty, of the National Center for Atmospheric Research, and 7NEWS reporter Marshall Zelinger led a team that answers your questions about cyber security and smartphone tracking.
Find an archived copy of the conversation below: