Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Infracore LLC is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (858) 509-1970.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Software Microsoft Malware Network Security Backup Hackers Windows 10 Internet Data Hardware Innovation Tech Term Smartphones Hosted Solutions Android Business Email Managed IT Services Alert VoIP Small Business Business Continuity Browser Outsourced IT Office Cloud Computing Data Backup Mobile Devices User Tips Computers Disaster Recovery Computer Smartphone Business Management Ransomware Productivity Efficiency Cybercrime Communications Law Enforcement Miscellaneous IT Services Money Passwords Social Media Password Data Recovery Facebook Virtualization Windows Managed IT Services Telephone Systems Network Artificial Intelligence Router Chrome Collaboration Cybersecurity How To Productivity Health Office 365 Gadgets Communication Social Engineering Work/Life Balance Internet of Things Quick Tips Upgrade App Data Breach Data Protection Hacking Wi-Fi Phishing Two-factor Authentication Applications IT Support Data Security Word Private Cloud Workplace Tips Bring Your Own Device Connectivity Apps Google Drive Automation Vulnerability HaaS Holiday Saving Money Office Tips Spam Windows 10 IT Support Mobile Device Management Microsoft Office IT Management Scam Redundancy Flexibility Worker Big Data Content Management Spam Blocking Avoiding Downtime PDF Computer Care Legal IT Plan Business Intelligence Mobility Automobile Managed Service Provider Blockchain Operating System Update Samsung Electronic Medical Records Identity Theft Government Unsupported Software Bandwidth Data Management Infrastructure Entertainment Remote Monitoring USB Value Save Money Managed IT Public Cloud Mobile Device Paperless Office Marketing Networking VPN Information Windows 7 Battery Employer-Employee Relationship Keyboard Charger BYOD BDR End of Support Server Data Storage Patch Management Comparison History Remote Computing Website CES Cleaning OneNote Sports Specifications Audit Telephone System Risk Management Google Apps Scalability Voice over Internet Protocol Excel Password Management Computing Infrastructure Hiring/Firing Amazon Web Services Nanotechnology iPhone Music Recovery Recycling IT solutions Physical Security Remote Work Network Congestion Practices Tools File Sharing Advertising Smart Office Wireless Transportation Safety Digital Signature Computer Fan Sync Relocation User Error Politics Rootkit Workers Addiction Books Assessment Tip of the week NIST Employer Employee Relationship Online Shopping Smart Tech Data loss Wearable Technology eWaste Monitor IT Consultant Hosted Computing Downtime Best Practice Cache webinar Document Management Benefits Millennials Encryption The Internet of Things Training Information Technology Multi-Factor Security Television HIPAA Windows 10s Windows Server 2008 Cryptocurrency Techology Users Computer Accessories Evernote Screen Mirroring Criminal HBO Servers Credit Cards Leadership Inventory Root Cause Analysis Content Vendor Management Password Manager Conferencing Software Tips Search Firewall Workforce FENG Telephony Humor Internet Exlporer Wireless Internet Instant Messaging Emergency Trending Public Computer Human Resources Safe Mode Files Virtual Reality Bluetooth Wireless Charging Devices Cast Troubleshooting Google Docs Loyalty Settings Outlook HVAC Data storage Save Time Fraud Access Control Botnet Hybrid Cloud Video Games Audiobook Business Mangement Emails Machine Learning How to Smart Technology Current Events Accountants Skype Managed Service Wire Staff Solid State Drive Flash Virtual Assistant Worker Commute Cortana Thought Leadership SaaS Frequently Asked Questions Enterprise Content Management Education Amazon Authentication Meetings Travel Apple Experience Gmail YouTube Black Market Two Factor Authentication Telecommuting Knowledge Start Menu MSP Internet exploMicrosoft Thank You Twitter Company Culture CrashOverride Congratulations Compliance Managing Stress Augmented Reality Regulation WiFi Webinar

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JeffereyANoah 5 Useful Cloud Apps for Small Businesses
15 August 2018
Sharing these type stuff is very useful and hope you will provide us more like this one. I come here...
Jared Albert VoIP Delivers Benefits That a Traditional Phone System Can’t
13 August 2018
A traditional telephone system is installed for the happiness of the people. Majority of the concern...
Meredith Maddox Tip of the Week: Tip of the Week: Mirror or Cast Your Android Device’s Screen
08 August 2018
Android mobile phones are top of the list now a days every one wants to buy android phone. It’s a bi...
MarianneJCruz Tip of the Week: Got a Solid State Drive? Here’s How to Take Care of It
31 July 2018
What a review https://www.uk.com/how-do-you-do.html
Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.