Female Rep 3

 

 "Quality is Job One"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

TWINTEL Solutions is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (888) 894-6411.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Google Mobile Devices Data VoIP Microsoft Disaster Recovery Business Business Continuity bgc roundup communications Internet nonprofit Software Email Alert User Tips Innovation Outsourced IT Managed IT Services IT Services Hardware Smartphones Data Backup Productivity Tech Term Managed IT Services Windows 10 Browser Computer Ransomware Cloud Computing Server Smartphone Saving Money Efficiency Data Recovery Cybercrime Android Workplace Tips Internet of Things IT Support Computers Small Business Business Management IT Support Communication Network BDR Passwords Office Miscellaneous Save Money Quick Tips Artificial Intelligence Productivity Cybersecurity Windows Chrome Holiday Recovery Windows 10 Gadgets Applications Mobile Device Management Router Managed IT Money Mobile Device Telephone Systems Social Engineering Mobility BYOD Work/Life Balance Wi-Fi Phishing Social Media Proactive IT Office 365 Virtualization Private Cloud Collaboration Upgrade Law Enforcement Hacking Facebook Vulnerability Automation Firewall Health Information VPN Password Microsoft Office Remote Monitoring Bandwidth Two-factor Authentication Bring Your Own Device Google Drive Word Data Protection Office Tips Flexibility Budget Avoiding Downtime Managed Service Provider How To App Compliance Servers Identity Theft Connectivity Data Breach Business Intelligence Encryption Managed Service Remote Computing Information Technology HaaS Save Time Sports History Spam Scam Black Market Mobile Computing Settings Value Operating System Apps Voice over Internet Protocol Safety Software as a Service Keyboard Data Security Redundancy IT Plan Update Business Owner CES Hiring/Firing SaaS The Internet of Things Cleaning Emergency Government Training Workers PDF Big Data WiFi Document Management Content Management Computing Infrastructure Credit Cards Solid State Drive Access Control Computer Care Marketing Patch Management Legal Google Docs Blockchain Virtual Assistant Hacker Windows 7 Fraud HIPAA OneNote Risk Management Samsung Unsupported Software Charger Physical Security Telephony Data Storage Website Automobile Human Resources Telephone System Wireless Technology Electronic Medical Records Infrastructure Paperless Office YouTube IT Management Data Management Worker End of Support USB Employer-Employee Relationship Data storage Machine Learning Comparison Entertainment Unified Threat Management Spam Blocking Battery Content Filtering Vendor Multi-Factor Security Digital Signature Rootkit Reputation Advertising Online Shopping Troubleshooting Cache Data loss Cryptocurrency Monitor Colocation Tip of the week Scalability Experience Warranty FENG Hard Drives Search Engine Business Mangement HVAC Smart Technology Network Congestion Robot Digital Signage HBO Specifications Inventory Wiring Windows 10s Tools Theft Education Display Trending Customers Flash Evernote Wireless Internet Screen Mirroring Techology Safe Mode Chromecast Employer Employee Relationship webinar Windows Server 2008 Devices Printer Laptop Relocation Bing Gmail Networking Two Factor Authentication Files Google Search Outlook Millennials Public Cloud IBM Security Cameras Data Warehousing Lifestyle Accountants MSP Vendor Management Sync Wireless Charging Shadow IT Books Cortana Wire Help Desk Cast Computer Accessories Conferencing Instant Messaging Thought Leadership Mouse Touchpad Assessment Humor Users Recycling Enterprise Content Management NarrowBand IT Consultant Net Neutrality Workforce Authentication Mobile Smart Office Supercomputer Apple Botnet Best Practice Content File Sharing Fiber-Optic Hosted Solution Google Apps Shortcuts Bluetooth Netflix Internet Exlporer Regulations Amazon Search Twitter Administrator Television CrashOverride Virtual Reality eWaste Password Management Leadership ISP Frequently Asked Questions Telecommuting Politics Nanotechnology Camera Going Green Audit Professional Services Transportation Current Events iPhone Smartwatch Software Tips Audiobook Practices Augmented Reality Skype Cables Social Staff Regulation Amazon Web Services How to Addiction Public Computer Worker Commute Criminal NIST User Error Excel Remote Work Smart Tech Printers Loyalty Computer Fan Microchip Meetings Password Manager Benefits Knowledge Downtime Employee Video Games Hosted Computing Remote Worker Wireless Start Menu Unified Communications Congratulations nonprofits GDPR E-Commerce Thank You