ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Choose a Good PIN for Your Credit Card

b2ap3_thumbnail_creditcard_security_400.jpgIdentity theft is commonplace on the Internet, and if you’re not careful with how you approach your browsing, you could potentially leak sensitive information to hackers. Unfortunately, some people are so concerned with protecting their other information, like Social Security numbers or dates of birth, that they forget that their PIN number is just as vulnerable to hacking as ever.

PINs, better known as Personal Identification Numbers, are one of the most basic ways of integrating two-factor authentication into your technology security strategy. However, you can only get so secure by using a PIN. Is there a certain formula that can maximize your PIN’s security? WiseGeek explains the process of choosing a PIN in detail, and discusses ways to improve the security of your own PIN. Basically, you want to avoid basing your PIN off of easily-obtainable information, and opt for one you can easily remember that’s personally significant to you.

Things to Not Base Your PIN Off Of

  • Your Social Security number. You’d be surprised how many people can memorize their Social Security number, but can’t remember a simple four-digit credential. These people often use the last four digits of their Social Security number as their PIN, and don’t even think twice about it. Don’t follow their lead. If someone were to acquire your Social Security number (or even just the last four digits), they might try to use it against you.
  • Your phone number. Once again, your phone number is probably readily available to anyone who wants it. If you were to use the last four digits of your phone number as a PIN, they would have no problem stealing from you.
  • The year you were born. Your date of birth isn’t secret, and if a thief can acquire it, they can crack your bank account just like stealing candy from a newborn. In fact, it’s best to avoid using dates of birth of any of your immediate family, as they can just as easily be found out.
  • Logical strings of numbers. Naturally, you don’t want to use a number that’s simple to guess, like 1234.

Ideas for Easy-to-Remember PINs

  • The year your favorite book or movie was released. You have interests other than your business, so put your brain to use and think about what your favorite book or movie might be. For example, if you’re a Star Wars buff, you might use 1977 as your PIN. However, be wary that hackers will suspect anything within the 1900s as fair game, simply due to the fact that most (if not all) people alive today were born in that timeframe.
  • Use the birthday of a close friend. Hackers might not immediately consider the birthday of your friend when trying to guess your PIN. Therefore, it’s much safer to use theirs than your own.
  • The current time. When you receive your card, or are changing your PIN, look at the clock. This might give you the inspiration you need to figure out the ideal number, so long as the time consists of three or four different numbers.
  • Your favorite holiday. For instance, if you particularly like Halloween, you would make your PIN be 1031, to reflect the month and day. Feel free to get creative with this one. There are a ton of unofficial holidays which you might be able to use, like National Cheeseburger Day (0918). This way, you’ll remember both your PIN and the glory that is National Cheeseburger Day.

By keeping these basic guidelines in mind, you’ll be better equipped when choosing a PIN number. If you have somehow misplaced your card or gotten it stolen, you can know that a hacker probably won’t be able to use your card to withdraw funds from your account. For more tips on how to maximize your security plans, give ClearView IT a call at 866-326-7214.

Bonus Tip:
duck duck tips

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Small Business Smartphones Microsoft Office Upgrade Mobile Devices Network Communication Managed IT Services Data Recovery Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Passwords Holiday Disaster Recovery Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Data Management Managed Service Provider Government Saving Money Operating System Workplace Strategy Gadgets Networking Windows Artificial Intelligence Managed IT services Server Information Bandwidth Remote Encryption Mobile Device Management App Business Technology Virtualization Blockchain Spam WiFi Employee/Employer Relationship Budget History Gmail Office Two-factor Authentication Apple Office 365 Information Technology Data Security Cybercrime Wi-Fi BDR Health Big Data Analytics Conferencing Access Control Save Money Patch Management Compliance Vendor Remote Monitoring Employer-Employee Relationship Voice over Internet Protocol Help Desk Hacking Cost Management IT Management Training Remote Computing Document Management Hacker Customer Service Unified Threat Management Firewall Augmented Reality Applications Word Search... Best Practice IBM Project Management BYOD Vulnerabilities Website Computing Retail Alert Vendor Management Mobile Office Hard Drive Hiring/Firing Managed Services Outlook Data loss Password Legal Money Data storage Social Sports SaaS DDoS Travel Mobile Computing Virtual Reality Data Breach Social Engineering Cryptocurrency Paperless Office Marketing Antivirus iPhone Black Market Running Cable Education Cortana Cleaning Maintenance Content Filtering Robot Windows 11 Storage Monitoring Router Healthcare Websites Remote Workers Meetings The Internet of Things Mobility YouTube Windows 7 Free Resource User Twitter Google Maps Scam Laptop Law Enforcement How To End of Support Printer VPN Chrome Update Administration Employees Google Docs Taxes Avoiding Downtime Presentation Bluetooth Specifications Distributed Denial of Service IT Consultant Office Tips Holidays Disaster Private Cloud Processor Memory Customer Relationship Management Cooperation Physical Security Co-Managed IT Video Conferencing Lithium-ion battery Entertainment Politics Virtual Machines Settings Computer Repair Machine Learning Multi-factor Authentication Professional Services Processors Start Menu Computer Care Solid State Drive Downloads Vulnerability Saving Time Chromebook Software as a Service Drones Managed Services Provider Bitcoin HIPAA Data Protection Computers Virtual Private Network Automobile Telephone Wireless Technology eWaste Current Events How To Microchip Excel Solutions Flexibility Downtime Safety Integration Tech Terms Images 101 Identity Theft Display Hack Virtual Desktop Notifications Managed IT Unified Communications Virtual Assistant PowerPoint Experience Digital Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Administrator SharePoint Electronic Payment Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Staffing Videos Access Database Surveillance IP Address Time Management Music Public Cloud Managing Costs Phone System Health IT Equifax SSID Hard Drive Disposal Employer/Employee Relationships Audit Media Spyware Tactics Development Username File Sharing Virtual Machine Botnet Rental Service Redundancy Reviews Micrsooft Startup Optimization Freedom of Information Smart Technology email scam Teamwork Recovery Navigation 2FA Competition Flash Cache Addiction Computer Accessories Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor LiFi User Tip Shopping Entrepreneur Legislation News Medical IT Network Management CCTV SQL Server Documents Printing Evernote Paperless Application Banking Touchscreen PCI DSS Business Intelligence Google Wallet Licensing Computer Malfunction Fake News Supply Chain Messenger Emergency Proxy Server Gig Economy Deep Learning Emails Humor Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Securty Business Communications Domains Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Webcam Microsoft Excel Workplace Books Uninterrupted Power Supply Wireless Headphones Memes Language Business Mangement Going Green Net Neutrality Society Business Cards Troubleshooting Tech Human Resources Error Financial Data Tablets Visible Light Communication Scams Reading Bookmark Risk Management Monitors IT Download Windows 8 Supercomputer Piracy Google Calendar Term Google Apps Public Speaking Virus Telework HTML Streaming Media Advertising Motion Sickness Microsoft 365 Cables Relocation Browsers Smartwatch Keyboard Displays Nanotechnology Communitications Work/Life Balance Google Drive Upload Procurement Tech Support Software License Business Owner Comparison Google Play Hard Drives Social Network FinTech intranet Point of Sale Wireless Knowledge Data Analysis CES Shortcut Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management Environment Employer Employee Relationship Mobile Technology Value In Internet of Things Television Security Cameras Heating/Cooling Hacks Customer Resource management Organization Social Networking Network Congestion Cabling Devices Cyber security Shortcuts Windows XP G Suite Tip of the week Reliable Computing Fileless Malware Writing Tablet Smart Devices VoIP Gamification Remote Working Tracking Company Culture Inbound Marketing Mouse Telephone System AI Regulations Trend Micro Be Proactive Web Server Transportation Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?