Female Rep 3

 

 "Quality is Job One"

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

TWINTEL Solutions is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (888) 894-6411.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 17 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Cloud Privacy Best Practices Technology Business Computing Hackers Backup Network Security Malware Hosted Solutions bgc roundup nonprofit Microsoft Google Software Disaster Recovery VoIP Managed IT Services Mobile Devices Business Continuity Alert Business Outsourced IT Windows 10 Email Data Smartphones communications Ransomware Hardware Innovation Android IT Services Cybercrime Server IT Support Internet Saving Money Managed IT Services Small Business Computer Office Browser Efficiency Productivity Data Backup Computers Social Engineering Telephone Systems Recovery Business Management Cloud Computing Windows Quick Tips Work/Life Balance User Tips BDR Money Save Money Smartphone Virtualization BYOD Passwords Managed IT Cybersecurity Hacking Mobility Mobile Device Management Health Chrome Phishing Managed Service Provider Social Media Network Remote Monitoring Proactive IT Vulnerability Office Tips Miscellaneous Budget Bring Your Own Device Upgrade App IT Support Wi-Fi Internet of Things Holiday Two-factor Authentication Collaboration Law Enforcement Productivity Flexibility Private Cloud Avoiding Downtime How To Data Recovery Firewall Communication Automation Office 365 Data Breach Safety Redundancy Information Technology Facebook Microsoft Office History Remote Computing Value Black Market Password Windows 10 Business Intelligence Google Drive HaaS Artificial Intelligence Bandwidth Operating System Gadgets Compliance Physical Security Keyboard Mobile Computing Spam Blocking Data Security Content Filtering Wireless Technology Hiring/Firing Workplace Tips Emergency Solid State Drive Applications Data storage Computer Care Legal Patch Management VPN Samsung HIPAA Spam Scam Router Data Storage Mobile Device Worker IT Management Business Owner SaaS IT Plan CES Identity Theft Government Workers Big Data Computing Infrastructure Marketing Credit Cards Save Time Word OneNote The Internet of Things Automobile Charger Risk Management Unsupported Software Apps Electronic Medical Records Data Management End of Support Employer-Employee Relationship Battery Unified Threat Management Password Manager Software as a Service Data loss Comparison Scalability Advertising Hard Drives Online Shopping Servers Education Cleaning Experience Business Mangement Windows 10s Update Specifications HBO PDF Relocation Evernote webinar Flash Employer Employee Relationship Screen Mirroring Files Gmail Public Cloud WiFi Millennials IBM Outlook Instant Messaging Humor Wireless Charging Conferencing Sync Users Computer Accessories Monitor Content Cast Best Practice Recycling Google Docs Workforce Supercomputer Search Chromecast Fiber-Optic Netflix Telephony Virtual Reality Bluetooth eWaste Audit Website Telecommuting Current Events Frequently Asked Questions How to Transportation Audiobook Cables Skype Worker Commute Loyalty Video Games USB User Error Criminal Computer Fan Voice over Internet Protocol Remote Work Knowledge Excel Benefits Wireless Entertainment Unified Communications Start Menu Rootkit FENG Multi-Factor Security Troubleshooting Going Green Colocation YouTube Network Congestion Tip of the week Smart Technology Document Management Training Techology Theft Tools Trending Content Management Windows Server 2008 Shadow IT Two Factor Authentication Downtime Vendor Management Reputation Cortana Lifestyle Assessment Data Warehousing Books Hacker Blockchain Fraud IT Consultant Windows 7 Robot Customers Apple Google Apps Settings Mobile CrashOverride Data Protection Television Hosted Solution Laptop Internet Exlporer Human Resources Amazon Leadership Regulations Politics iPhone Infrastructure Professional Services Meetings Public Computer Software Tips Touchpad Sports Staff NarrowBand Amazon Web Services Digital Signature nonprofits Thank You Congratulations