Infracore LLC Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Infracore LLC is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (858) 509-1970.

Unpaid Invoices Were a $825 Billion Problem Last Y...
ALERT: Meltdown/Spectre Hardware Vulnerability Req...

Comments 1

Rachel McClemans on Tuesday, 25 September 2018 10:41

Complex to the password on the 2k18 is now be more secure as to all data and personal information can’t be leak out by enemies. Companies are paying the billions of the dollars for the passwords through this website that sideline of the boundaries are now being saved.

Complex to the password on the 2k18 is now be more secure as to all data and personal information can’t be leak out by enemies. Companies are paying the billions of the dollars for the passwords through this website that sideline of the boundaries are now being saved.
Already Registered? Login Here
Sunday, December 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business computing Google Malware Hosted Solutions Microsoft Hackers Innovation Software Data Hardware Business User Tips Internet Tech Term Smartphones Backup Business Continuity Email Data Backup Mobile Devices Windows 10 Browser Computer Android VoIP Smartphone Cloud Computing Communications Productivity Small Business IT Services Outsourced IT Data Recovery Managed IT Services Business Management Alert Workplace Tips Disaster Recovery Miscellaneous Ransomware Office Efficiency Chrome Managed IT Services Computers Law Enforcement Network Artificial Intelligence Cybercrime Communication Windows 10 Internet of Things Router How To Productivity Telephone Systems Money Passwords Office 365 Password Applications Collaboration Cybersecurity Social Media IT Support Facebook Virtualization Windows Google Drive Work/Life Balance Spam Information Saving Money Quick Tips Server Upgrade App Holiday Health Word Gadgets Social Engineering Mobile Device Connectivity Apps Vulnerability Automation HaaS Office Tips IT Support BDR Managed Service Mobile Device Management Bring Your Own Device Save Money Microsoft Office Hacking Data Protection Phishing Wi-Fi Voice over Internet Protocol Mobility Keyboard Data Security Private Cloud Two-factor Authentication Scam Data Breach Big Data Public Cloud Telephony Servers Computer Care Marketing Windows 7 VPN Settings Paperless Office Human Resources BYOD Battery Electronic Medical Records Data Storage Fraud Samsung End of Support Google Docs Training History Bandwidth Comparison Entertainment Virtual Assistant Remote Computing OneNote IT Management USB Value Redundancy Website CES Flexibility Avoiding Downtime Spam Blocking Firewall Networking Telephone System Sports PDF Employer-Employee Relationship Legal IT Plan Content Management Software as a Service Automobile Charger Operating System Business Intelligence Patch Management Managed Service Provider Blockchain Unsupported Software Government Data Management Remote Monitoring Identity Theft Cleaning Update Managed IT Encryption Worker Infrastructure Multi-Factor Security HIPAA Hiring/Firing Cryptocurrency Conferencing Software Tips Content Evernote FENG Network Congestion Cast Credit Cards Inventory Music Remote Worker Humor Internet Exlporer Search WiFi Criminal Virtual Reality Botnet Workforce Politics Rootkit Files Instant Messaging Outlook Password Manager Transportation Safety Search Engine Trending Employer Employee Relationship Safe Mode Data storage Emails Video Games Audiobook Wireless Charging Devices Books Assessment Wireless Internet Warranty Hybrid Cloud Skype IT Consultant HVAC Access Control Wearable Technology Wiring Solid State Drive How to Flash Meetings Worker Commute Travel Accountants Frequently Asked Questions Business Mangement Benefits Machine Learning Bing Start Menu Staff Computer Accessories Cortana Thought Leadership Television Wire Printer Apple Education Leadership Enterprise Content Management Amazon Authentication Unified Threat Management Internet exploMicrosoft Audit Black Market YouTube Help Desk Telecommuting Vendor Management MSP Excel Gmail Computing Infrastructure Tools Specifications Bluetooth IT solutions Scalability Physical Security Google Apps Emergency Public Computer Mouse iPhone Save Time Password Management Amazon Web Services Nanotechnology Troubleshooting Loyalty Mobile Computing Advertising Computer Fan Sync Data loss Remote Work Practices File Sharing Relocation User Error Wireless Tip of the week Recovery Recycling Smart Technology Current Events Downtime Digital Signature Workers Addiction Smart Office Administrator NIST Monitor webinar Best Practice Online Shopping Smart Tech SaaS Camera The Internet of Things Two Factor Authentication Knowledge Shortcuts Screen Mirroring Hosted Computing Experience Augmented Reality Windows 10s Windows Server 2008 eWaste Techology Root Cause Analysis Users Millennials Risk Management Information Technology HBO Cache Document Management Microchip Printers Webinar Thank You CrashOverride Twitter Company Culture Congratulations Compliance Managing Stress Regulation

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...
Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...