Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Infracore LLC is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (858) 509-1970.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Software Network Security Microsoft Malware Hackers Windows 10 Backup Internet Android Business Email Smartphones Small Business Business Continuity Innovation Managed IT Services Hosted Solutions Hardware Browser Alert Data VoIP Ransomware Office Business Management Computers Disaster Recovery Smartphone Law Enforcement Outsourced IT Cloud Computing User Tips Cybercrime Efficiency Productivity Computer IT Services Data Backup Telephone Systems Mobile Devices Tech Term Communications How To Chrome Productivity Cybersecurity Collaboration Virtualization Quick Tips Artificial Intelligence Money Communication Managed IT Services Social Engineering Miscellaneous Router App Health Passwords Windows Password Social Media Work/Life Balance Google Drive Mobile Device Management HaaS Bring Your Own Device IT Support Data Recovery Office 365 Data Security Internet of Things Facebook Windows 10 Two-factor Authentication Network Automation Saving Money Office Tips Hacking Phishing Holiday Upgrade Wi-Fi Data Breach Vulnerability Apps Spam Private Cloud Data Protection Electronic Medical Records Public Cloud Server Business Intelligence Marketing Redundancy Avoiding Downtime Microsoft Office History Legal Keyboard VPN Charger Flexibility Patch Management Applications Remote Monitoring PDF Cleaning Mobility Scam Mobile Device Website Managed Service Provider CES Computer Care Update Data Storage OneNote Remote Computing IT Management Employer-Employee Relationship Identity Theft Spam Blocking End of Support Infrastructure IT Plan Operating System Word Automobile Unsupported Software Managed IT Data Management Workplace Tips Comparison Worker Big Data Samsung Bandwidth Government Gadgets BYOD Value Battery Travel Meetings Networking Recycling Digital Signature Training Audit Files Loyalty Smart Tech Education Online Shopping Save Money Hybrid Cloud Current Events eWaste Encryption Millennials Physical Security Vendor Management IT solutions Computer Fan Emergency SaaS Connectivity Computing Infrastructure Evernote Sync Data loss Save Time Knowledge Apple Criminal Workforce IT Support The Internet of Things Devices Wireless Charging Best Practice Google Docs Screen Mirroring Network Congestion iPhone Experience Accountants BDR HBO FENG User Error Assessment Thought Leadership Users Relocation Cortana Telephony Recovery Cast Hiring/Firing IT Consultant Content Music Monitor Search Telecommuting Outlook Settings Transportation Television Virtual Reality Google Apps Skype Video Games Voice over Internet Protocol Employer Employee Relationship Information Technology Leadership Audiobook Content Management Wearable Technology Practices How to Remote Work Frequently Asked Questions Benefits Internet Exlporer Public Computer Addiction Worker Commute Humor Workers Start Menu Computer Accessories Entertainment Blockchain USB Data storage Hosted Computing Black Market Excel Tools Firewall Cache HIPAA Scalability Multi-Factor Security Bluetooth Troubleshooting Inventory Credit Cards Tip of the week Downtime Smart Technology Internet exploMicrosoft Wireless Internet Password Manager Human Resources Trending webinar Windows 10s Access Control Fraud Windows Server 2008 Root Cause Analysis Two Factor Authentication Advertising Safety Business Mangement Staff Software Tips Wireless Conferencing Risk Management Authentication Amazon Windows 7 Botnet Gmail Instant Messaging Specifications Rootkit Emails Politics Techology Solid State Drive Books Nanotechnology Amazon Web Services Flash Webinar WiFi Twitter CrashOverride Thank You Wire Congratulations Sports

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...