Infracore LLC Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Infracore LLC is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (858) 509-1970.

Unpaid Invoices Were a $825 Billion Problem Last Y...
ALERT: Meltdown/Spectre Hardware Vulnerability Req...

Comments 1

Rachel McClemans on Tuesday, 25 September 2018 10:41

Complex to the password on the 2k18 is now be more secure as to all data and personal information can’t be leak out by enemies. Companies are paying the billions of the dollars for the passwords through this website that sideline of the boundaries are now being saved.

Complex to the password on the 2k18 is now be more secure as to all data and personal information can’t be leak out by enemies. Companies are paying the billions of the dollars for the passwords through this website that sideline of the boundaries are now being saved.
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Hackers Malware Software Microsoft Innovation Internet Data Tech Term Hardware Smartphones Backup Email Windows 10 Hosted Solutions Browser Android Business VoIP Mobile Devices Computer Business Continuity IT Services Managed IT Services User Tips Data Backup Alert Workplace Tips Small Business Smartphone Office Ransomware Outsourced IT Computers Business Management Disaster Recovery Communications Cloud Computing Productivity Miscellaneous Artificial Intelligence Efficiency Cybercrime Law Enforcement Data Recovery Communication Managed IT Services Router Productivity Money Windows 10 Passwords Telephone Systems How To Social Media Password Applications Cybersecurity Chrome Facebook Virtualization Collaboration Windows Internet of Things Network Server Upgrade App Health Office 365 Social Engineering Gadgets Work/Life Balance Quick Tips Saving Money IT Support Data Protection Vulnerability Microsoft Office Bring Your Own Device Spam Hacking Save Money Two-factor Authentication Wi-Fi Holiday Mobile Device Management Keyboard Private Cloud Connectivity Information Phishing Scam Data Breach Google Drive Apps IT Support Data Security Automation Word HaaS Office Tips History Managed IT Samsung Telephone System Electronic Medical Records Sports Content Management Training Windows 7 Remote Computing Bandwidth Settings Entertainment BYOD Flexibility Business Intelligence USB Value PDF Blockchain Firewall Networking Data Storage Legal Identity Theft Update Mobility Automobile Encryption Managed Service Provider OneNote Infrastructure Employer-Employee Relationship Charger Government Redundancy IT Management Spam Blocking Patch Management Avoiding Downtime Data Management VPN Paperless Office Cleaning Public Cloud IT Plan Worker Operating System Mobile Device Fraud BDR Big Data Managed Service Marketing Comparison Computer Care Virtual Assistant Unsupported Software Battery CES End of Support Remote Monitoring Website YouTube HBO Telecommuting Books Assessment MSP Root Cause Analysis How to Gmail Employer Employee Relationship Specifications Worker Commute Wearable Technology Apple FENG Telephony Google Apps IT Consultant Mouse Conferencing Software Tips Voice over Internet Protocol Education Password Management Internet exploMicrosoft Amazon Web Services Nanotechnology Benefits Mobile Computing Cast Outlook Remote Work Practices Television File Sharing Botnet Recovery Black Market Recycling Computer Accessories Digital Signature iPhone Skype Workers Addiction Leadership Smart Office Emails Computing Infrastructure Vendor Management NIST Solid State Drive Advertising Flash Scalability Online Shopping Smart Tech Camera Relocation User Error Frequently Asked Questions Hosted Computing Emergency Public Computer Augmented Reality Meetings Travel eWaste Bluetooth Millennials Troubleshooting Loyalty Start Menu Wireless Cache Save Time Document Management Multi-Factor Security HIPAA Cryptocurrency Audit Evernote Smart Technology Current Events Monitor Servers Excel Best Practice Credit Cards Inventory Remote Worker Criminal IT solutions Physical Security Workforce SaaS Tools Password Manager Techology Trending Users Human Resources Experience Safe Mode Computer Fan Sync Information Technology Wireless Charging Devices Two Factor Authentication Knowledge Wireless Internet Warranty Risk Management HVAC Humor Internet Exlporer Tip of the week Content Access Control Wiring Data loss Google Docs Machine Learning Files Accountants Downtime Search Business Mangement Hiring/Firing Virtual Reality Staff Music The Internet of Things Hybrid Cloud Instant Messaging Cortana Thought Leadership Network Congestion Wire Printer webinar Data storage Politics Rootkit Enterprise Content Management Windows 10s Windows Server 2008 Video Games Amazon Audiobook Authentication Transportation Safety Unified Threat Management Screen Mirroring Twitter Company Culture Thank You Compliance Administrator Managing Stress Congratulations Webinar Regulation Printers WiFi CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...
JeffreyKGuertin Tech Term: Modems and Routers Defined
18 October 2018
Thank you so much for defining here the modems and routers to give us better information about this....
Shay Stuart How the Convenience of The Internet of Things Can Come Back to Bite Us
17 October 2018
This is a very important share that delivers facts about the utilization of internet tools in differ...
Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...