Female Rep1


 "99% Positive Customer Satisfaction Rate"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

TWINTEL Solutions is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (888) 894-6411.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions VoIP Mobile Devices Data Google Microsoft Business nonprofit Disaster Recovery bgc Email Software roundup Alert Innovation Internet Managed IT Services Business Continuity Outsourced IT communications Hardware IT Services Smartphones Managed IT Services Tech Term Data Backup Windows 10 Browser User Tips Server Computer Saving Money Ransomware Cloud Computing Data Recovery Efficiency Android Cybercrime Business Management Small Business Smartphone Network Internet of Things Workplace Tips BDR IT Support Computers Save Money Miscellaneous Productivity Quick Tips Communication Productivity Windows Passwords IT Support Office Chrome Mobile Device Management Artificial Intelligence Telephone Systems Money BYOD Social Engineering Applications Cybersecurity Recovery Managed IT Social Media Phishing Gadgets Firewall Mobility Upgrade Law Enforcement Windows 10 Hacking Facebook Work/Life Balance Vulnerability Virtualization Collaboration Private Cloud Flexibility Budget Microsoft Office Bring Your Own Device Bandwidth Data Protection App Two-factor Authentication Automation Wi-Fi Password Router Managed Service Provider Office Tips Holiday Avoiding Downtime Office 365 Information Remote Monitoring How To VPN Health Compliance Proactive IT Apps Spam Mobile Device Google Drive Sports Data Breach Keyboard Information Technology Mobile Computing History Black Market Operating System Data Security Safety Scam Servers Value Identity Theft Connectivity Business Intelligence HaaS Redundancy Remote Computing Word Automobile Hiring/Firing Government Blockchain Virtual Assistant Windows 7 SaaS Fraud PDF Solid State Drive Cleaning Computing Infrastructure Marketing Unsupported Software Training Workers Data Management USB Data Storage Website Telephone System Battery Content Filtering Computer Care Entertainment Infrastructure Paperless Office Patch Management IT Management Voice over Internet Protocol Business Owner OneNote Wireless Technology Physical Security Emergency Samsung YouTube Software as a Service Charger Comparison Settings Big Data IT Plan Document Management Update CES End of Support Electronic Medical Records Legal Data storage Worker Save Time Encryption Managed Service HIPAA WiFi Employer-Employee Relationship Content Management Credit Cards The Internet of Things Risk Management Unified Threat Management Spam Blocking Cortana Wire Data Warehousing Rootkit Lifestyle Laptop Robot Accountants MSP Sync Wireless Charging Chromecast Search Cast Google Docs Virtual Reality FENG Politics Customers Thought Leadership Mouse Relocation Recycling Enterprise Content Management Workforce Windows 10s Audiobook Authentication Smart Technology Mobile Network Congestion Google Apps Smart Office Touchpad Files File Sharing Telephony Fiber-Optic How to Employer Employee Relationship webinar Worker Commute Human Resources Regulations Amazon NarrowBand Twitter Administrator Humor eWaste Password Management Frequently Asked Questions Telecommuting Public Cloud Video Games Hacker Nanotechnology Camera Two Factor Authentication Professional Services Software Tips Vendor Management Practices Augmented Reality Skype IBM Cables Troubleshooting Microchip Addiction Computer Accessories Conferencing Going Green Apple Staff Regulation Assessment Amazon Web Services Scalability Experience Education Criminal NIST Excel Remote Work Internet Exlporer Smart Tech Printers Meetings IT Consultant Password Manager Machine Learning Hosted Computing Remote Worker Start Menu Supercomputer Unified Communications Search Engine Cache Bluetooth Multi-Factor Security Netflix Techology iPhone Digital Signature Television Online Shopping CrashOverride Leadership Cryptocurrency Tip of the week Audit Warranty Data loss Bing Business Mangement HVAC HBO Specifications User Error Inventory Wiring Transportation Tools Current Events Theft Shadow IT Books Wireless Internet Trending Downtime Flash Public Computer Evernote Instant Messaging Wireless Screen Mirroring Users Safe Mode Windows Server 2008 Loyalty Computer Fan Reputation Advertising Devices Printer Hosted Solution Help Desk Hard Drives Gmail Networking Outlook Millennials Best Practice Content Monitor Colocation Access Control Benefits Knowledge E-Commerce Thank You nonprofits Congratulations GDPR