• Skip to primary navigation
  • Skip to main content
An official website of the State of North Dakota
Photo of the BND Logo in full color

Bank of North Dakota

Photo of the BND Logo in full color
  • Home
  • About BND
    • The BND Story
    • Leadership
    • Mission, Vision, Core Values
    • BND Operations
    • BND Open Meetings
    • Job Opportunities
    • News
    • Contact Us
  • Education Funding
    • Be Confident with Your Decisions
          • Be Confident with Your Decisions


          • Smart with My Money
          • FAFSA Facts
          • College Cost Guide
          • Student Loan Application Steps
          • Cosigning Student Loans
          • Salary-to-Debt Calculator
          • Earn College Credits During High School
          • North Dakota Dollars for Scholars
          • Scholarships and Grants
          • College SAVE 529
          • Educational Materials
    • Apply for a Student Loan
          • Apply for Student Loan


          • Apply for a DEAL Student Loan
          • Access Your In-progress Loan Application
          • DEAL Student Loan
          • Career Education & Alternative Learning (CEAL) Loan
          • Addiction Counselor Internship Loan (ACIL)
          • Information for Cosigners
          • Information for Financial Aid Offices
          • DEAL Student Loan Calculator
          • Salary-to-Debt Calculator
    • Refinance a Student Loan After College
          • Refinance a Student Loan After College


          • Apply to Refinance Your Loan
          • DEAL One Loan
          • DEAL One Student Loan Calculator
          • Information for Cosigners
    • Repay Your Student Loan
          • Repay Your Student Loan


          • Log in to Your Account
          • Manage Your Student Loan Online
          • Information for Cosigners
          • How to Make a Payment
          • Repayment Plans
          • Difficulty Making Payments
          • Career-based Loan Repayment Options
          • Understand Your Statement
          • Frequently Asked Questions (FAQ)
          • Repayment Calculator
    • College SAVE
  • Loans
    • Ag Loans
          • Ag Loans


          • 2024 Ag Disaster Relief Loan Program
          • Ag Commodity Export Enhancement Program
          • Agriculture Diversification and Development Fund
          • Ag PACE
          • Beginning Farmer Chattel Loan
          • Beginning Farmer Real Estate Loan
          • Biofuels PACE Program
          • Envest
          • Established Farmer Real Estate Loan
          • Family Farm Loan Program
          • Farm and Ranch Bank Participation Loan Program
          • Farm Operating Loan Program
          • Farm Real Estate Loan Guarantee Program
          • First Time Farmer Finance Program
          • FSA Guaranteed Loan Purchase Program
          • Ag Lending Calculator
    • Business Loans
          • Business Loans


          • Accelerated Growth Loan Program
          • Bank Participation Loan Program
          • Bank Stock Loan
          • Beginning Entrepreneur Loan Guarantee
          • Bulk Propane Storage Tank Revolving Loan Fund
          • Business Development Loan Program
          • Clean Sustainable Energy Authority Loan Fund (CSEA)
          • Export Enhancement Program
          • Flex PACE for Affordable Housing
          • Flex PACE Program
          • Legacy Investment for Technology Loan Fund (LIFT)
          • Match Program
          • PACE Program
          • SBA Guaranteed Loan Purchase Program
          • USDA Guaranteed Loan Purchase Program
          • Value-added Guarantee Loan
          • Venture Capital Fund
    • Infrastructure Loans
          • Infrastructure Loans


          • BND Infrastructure Revolving Loan Fund
          • Critical Financial Need Program for Political Subdivisions
          • Health Information Technology Fund
          • Legacy Infrastructure Loan Fund
          • Medical Infrastructure Loan Fund
          • School Construction Assistance Revolving Loan Fund
          • Water Infrastructure Revolving Loan Fund
    • Education Funding
          • Education Funding


          • Be Confident with Your Decisions
          • Apply for a Student Loan
          • Refinance a Student Loan After College
          • Repay Your Student Loan
  • Bank Services
    • Financial Institutions
          • Financial Institutions


          • Automated Clearing House (ACH)
          • BND Direct Cash Management
          • Bond Accounting
          • Coin & Currency
          • Collateral Valuation Services
          • Deposit Accounts
          • Executive Analytics
          • Fed Activity Settlement
          • Federal Funds
          • Federal Funds Sweep
          • Government Security Purchases
          • Item Processing
          • Letter of Credit Pledge for Public Deposits
          • Loan Payments
          • Pledging Services
          • Repurchase Agreements
          • Safekeeping
          • Stress Testing Model
          • Wire Transfers
    • Government
          • Government


          • Automated Clearing House (ACH)
          • BND Direct/Cash Management
          • Bond Registrar
          • Certificates of Deposit
          • Checking and Savings Accounts
          • Disputed Royalty Payments
          • Escrow Agent
          • Government Security Purchases
          • Merchant Services
          • Oil and Gas Cash Bond
          • Paying Agent
          • Positive Pay
          • Remote Deposit Capture
          • Safekeeping
          • Trustee
          • Wire Transfers
    • Public
          • Public


          • ABLE Plan
          • Certificate of Deposit
          • Checking and Savings Accounts
          • Online and Mobile Banking
          • Electronic Funds Transfer Disclosure
          • Foreign Currency
          • Loan Payments
          • Wire Transfers
  • Account Login
        • Account Login and New User

          Access your Bank of North Dakota (BND) online account anytime, anywhere. If you are a New User, choose your account and follow the steps to open your online account.

          Agriculture
          Loans
          Business
          Loans
          Home
          Loans
          Student
          Loans
          Checking/
          Savings
        • Business, Government, and Financial Institutions Login

          Businesses, Government agencies and Financial Institutions access your BND online account anytime, anywhere.

          BND
          Direct
          Secure
          Transfer
          Investment
          Portal
          Infrastructure
          Loan
  • Show Search
Hide Search

Create A Strong And Unique Password For Every Account

Photo of a person's hands holding and using a cellphone
Home » News » Create A Strong And Unique Password For Every Account

December 2, 2018 BND News Security & Fraud

It’s not the newest trend. In fact, it’s rather old news. It’s still important to use strong passwords, use passphrases, and YES! Passwords really do still get cracked. The many techniques for obtaining passwords over the years have become more sophisticated, but the tried and true methods still work. The top methods for cracking passwords, in no particular order are rainbow tables, brute force attacks, social engineering, phishing, malware, and plain old guessing.

The more complex your passwords are, the less likely they will end up in the hands of a cybercriminal. The age-old advice for selecting passwords still remains true:

  • Combine upper and lower case letters.
  • Use no less than eight characters. Passphrases are best.
  • Include at least one number and one special character. More of each is better.
  • Make them easy to remember, but difficult to guess. For example, make them create a pattern on the keyboard or use a base phrase and add to it based on the website name.
  • Having strong passwords is important. Sometimes knowing why is helpful. One reason is because time is money; even in cybercrime. The easier the password, the easier and faster it is to crack. It’s as simple as that.

Criminals often crack passwords en masse, so when they get enough easy ones figured out, they move on to the next phase of their crime and dump the ones they can’t figure out quickly.
Knowing how they end up in the hands of the cybercrime world may help in understanding why it’s so important. So let’s get back to those aforementioned methods.

strong-password-steps

At a high level, rainbow tables are long lists of every possible plain text permutation of encrypted passwords. Attackers use these in password cracking software and can try a lot of passwords in a short period of time, depending on the size of the list. Thus, security experts recommend using longer passwords and phrases. The longer they are, the more time it takes for them to be found in these lists.

Brute force attacks use dictionary words working through all possible combinations of alpha-numeric characters from AA1 to zz1. These are not quickly done, but often those who use them have a lot of time on their hands and it’s worth the effort. In any case, the longer the password, the longer it takes to figure it out.

Social engineering is the foundation of so many security related breaches; whether they are intrusions into a network, theft of a password to get into an account, or getting malware onto a computer. At a basic level it involves getting users to give up passwords or access. Hackers are amazingly successful at getting information by pretending to be someone else and bringing victims into their confidence. A favorite scene for the social engineering actor is to call workers in an office posing as the IT person. They simply ask for passwords and surprisingly and unfortunately, it really works.

Phishing should be familiar to everyone by now. According to IBMs X-force researchers, phishing increased four times in 2017 over the previous year. And it’s not only increasing in volume, it is evolving and getting more sophisticated. It’s getting to a point that identifying phishing is nearly impossible, even for the most educated on the topic. Currently, it’s estimated that more than half of the email we receive is spam. Most of it gets caught in spam filters, but much of it doesn’t. Of the messages that make it to users’ in boxes, about half are opened. Roughly 10% of those are acted upon. These messages are trying to coax the users out of information and often times it’s a password to some account that will net the thief something of value.

Next, there is malware. This is software that ends up on a computer or device and can be used for any number of activities from logging key strokes (key loggers) to redirecting a web browser to fake websites to collecting administrator rights to networks.

Finally, there is the highly unsophisticated method of guessing. Believe it or not, it still works. People often create passwords based off of information that is not so hard to find out such as kids’ names, birthdates, pets names, etc. This is especially true with the rise in popularity of social media and networking websites. People post their kids’ names, birthdates, pets’ names, their travel plans, addresses and so forth on their social media profiles. A savvy hacker may use the previously discussed social engineering techniques to befriend victims and simply guess passwords.

There are many more strategies for getting passwords. No matter what you come up with for yours, it needs to and should make sense to you and no one else. If you must write them down, do it. Just keep it separate from your computer and mobile device and keep it out of plain sight. And if you can use clues to trigger your memory, that’s better than writing out the passwords in their entireties.

We have a lot of passwords these days used for everything from online magazine subscriptions to logging in to check our healthcare information. We trust many others with our sensitive information and the only thing between us and that information is still quite often, only a password.

Protecting that information is critical. Following are some guidelines regarding passwords and protecting them as well as the information they protect:

  • Don’t use words commonly found in any dictionary for your passwords; even in foreign language dictionaries. Don’t use slang terms or phrases either. The bad guys are onto that too. If you are thinking of substituting an “1” with the lower case “L,” don’t bother. That’s an old trick. Spelling words backwards or with common misspellings; they know those too and even use those for other trickery.
  • Never include personal details in passwords such as your name, birthdates of your kids or loved ones, or even pets’ names. Those are not all that difficult to find out anymore, so don’t make it easy on someone with ill intentions.
  • When your password recovery options ask which questions you want to choose, pick ones that are not obvious and few people know the answers to; better yet, make up your answers. Just don’t forget what you chose, if you decide on this strategy.
  • Several studies have found out that using device default passwords is still common. Year after year, “12345” and derivations of it still top the most commonly used password lists. The number 2 password is “password.”  Be more creative than this.
  • Password reuse is common and is still a bad idea. This means using the same password for multiple accounts. Yes, using so many different ones may seem daunting, but it’s important. It’s particularly critical to make sure your social media, healthcare, and financial account passwords are completely different from one another and from everything else.
  • When using public computers, in a hotel business center or internet café when traveling for example, make sure that the box to remember your password is NOT checked and be sure to close out the browsers you used before leaving. Otherwise, someone may use the computer after you and get access to your accounts or be able to view what you just did.
  • If you are sitting in a coffee shop enjoying a cup of joe and decide to check out the Internet using their free wireless, avoid logging into any of your accounts that have sensitive data, including your work accounts. Hackers are often found lurking in these places using programs to intercept passwords. If you need to check something and it can’t wait till you get to a secured location, use the data network on your smartphone rather than the wireless. If you’re logging into your office from a remote public location, use a VPN.
  • It may seem obvious, but it happens a lot. Don’t tell anyone else your passwords. This includes anyone from your IT department. They just don’t need them. If you just cannot remember it, reset it.
  • Make it a routine to change passwords to online accounts regularly. It is recommended to do this at least once every three months.

It’s OK to have online accounts. They are convenient and help us stay on top of information and help us do our jobs. Just keep basic security guidance in mind when using them.

© Copyright 2018 Stickley on Security Inc.

Categories: BND News Security & Fraud

Footer

Photo of the BND Logo in white

Bank of North Dakota

PO Box 5509
1200 Memorial Hwy
Bismarck, ND 58506-5509
E:Email BND: bnd@nd.gov
TF:Toll-Free Phone Number: (800) 472-2166 P:Local Phone Number: (701) 328-5600 TTY:TTY: (800) 366-6888

About BND

  • Contact Us
  • BND Operations
  • Job Opportunities
  • Mission, Vision, Core Values
  • The BND Story

Resources

  • College Cost Guide
  • College SAVE 529
  • Forms
  • Smart with My Money
  • ND Dollars for Scholars

Financials

  • Annual Reports
  • Credit Rating
  • Financing Reports
  • Interest Rates
  • Quarterly Reports

Securities & Policies

  • Disclaimer
  • Privacy Policy
  • Security & Fraud
  • USA Patriot Act
  • Whistleblower Hotline

Connect with BND on social media

  • Facebook
  • Instagram
  • LinkedIn
  • YouTube
  • X (Twitter)

Copyright © 2025 Bank of North Dakota. All right reserved.
The documents on bnd.nd.gov require Adobe Acrobat Reader to view and print.

  • Accessibility Statement
  • Privacy Policy