Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Infracore LLC is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (858) 509-1970.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Software Microsoft Google Business computing Network Security Windows 10 Backup Hackers Malware Business Smartphones Business Continuity Innovation Android Hardware Managed IT Services Alert Small Business Email Office Hosted Solutions Browser Disaster Recovery Data Computers Computer VoIP Ransomware Outsourced IT Business Management Internet Cybercrime Mobile Devices Virtualization Data Backup Productivity Cloud Computing Smartphone Telephone Systems Productivity Efficiency User Tips How To Chrome Law Enforcement Quick Tips Money Cybersecurity Collaboration Windows Social Engineering Work/Life Balance Communications IT Services Miscellaneous App Managed IT Services Health Passwords Social Media Password HaaS Data Breach Artificial Intelligence IT Support Hacking Holiday Wi-Fi Spam Facebook Data Recovery Office Tips Bring Your Own Device Communication Router Upgrade Office 365 Windows 10 Two-factor Authentication Private Cloud Google Drive Operating System Comparison Word Remote Computing Unsupported Software History Samsung Flexibility Vulnerability PDF Automobile Business Intelligence Value Mobility Managed Service Provider Data Management Workplace Tips Mobile Device Management Worker Big Data Apps Redundancy Avoiding Downtime Internet of Things Battery Network Electronic Medical Records Automation Server Saving Money Data Security End of Support CES Remote Monitoring Microsoft Office Legal Keyboard Charger Patch Management Data Storage OneNote Scam Government Gadgets IT Management Employer-Employee Relationship Computer Care Spam Blocking Public Cloud IT Plan Marketing Phishing Files Wearable Technology Business Mangement How to Tip of the week Downtime Hybrid Cloud Benefits Staff Worker Commute Computer Accessories webinar Entertainment Amazon USB Gmail Black Market Windows Server 2008 Windows 10s Root Cause Analysis Firewall Data Protection Safety Apple Specifications Managed IT Scalability Software Tips Bluetooth Conferencing Amazon Web Services Troubleshooting Recycling Windows 7 Smart Technology Digital Signature Bandwidth iPhone Botnet BYOD Emails Online Shopping User Error eWaste Relocation Flash Solid State Drive Meetings Two Factor Authentication Networking Millennials Travel Monitor Risk Management Evernote Criminal Loyalty Audit Information Technology Current Events Workforce Instant Messaging Physical Security Rootkit IT solutions Politics Wireless Charging Computer Fan Internet Exlporer Books SaaS Humor Google Docs Sync Data loss Knowledge BDR Cortana Training IT Support Data storage The Internet of Things Education Website Screen Mirroring Save Money Network Congestion Telecommuting Google Apps HBO Vendor Management FENG Internet exploMicrosoft Emergency Content Management Assessment Computing Infrastructure Voice over Internet Protocol Telephony Recovery Cast Save Time IT Consultant Remote Work Workers Outlook Settings Advertising Blockchain Television Applications Skype Best Practice Update Wireless Leadership Identity Theft Experience Infrastructure Frequently Asked Questions Cleaning HIPAA Public Computer Users Multi-Factor Security Start Menu Mobile Device Hiring/Firing Content Credit Cards Music Password Manager Search Excel Techology Transportation Human Resources Virtual Reality Trending Tools Video Games Employer Employee Relationship Audiobook Fraud Encryption Webinar WiFi Thank You Congratulations CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...