253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Graemouse Technologies is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 253.777.0763.

Unpaid Invoices Were a $825 Billion Problem Last Y...
ALERT: Meltdown/Spectre Hardware Vulnerability Req...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Practices Comparison Network Security IT Support Efficiency Root Cause Analysis Windows 7 Word Government Office Travel Microsoft Office Update Value Telecommuting Business Continuity Cybercrime Social Media Online Shopping Hybrid Cloud Net Neutrality Work/Life Balance Data Thought Leadership Digital Signature Internet of Things Phishing Skype Bandwidth Internet Internet Exlporer FCC Windows Identity Theft Network Congestion Content Management Law Enforcement Smartphone Multi-Factor Security Spam Spam Blocking Voice over Internet Protocol Computers Android Files VPN PDF Data Storage Data Security Electronic Medical Records Bring Your Own Device Unsupported Software Ransomware Communication Network Tech Term Windows 10 CES Relocation Start Menu Computer Smartphones Humor Social Engineering Two-factor Authentication Saving Money Apps Knowledge Best Practices OneNote Cortana Infrastructure Smart Tech IBM Wireless Charging Cloud Computing Screen Mirroring Legal Vulnerability Communications Telephone Systems Data Protection Holiday BDR Alert Avoiding Downtime Online Chrome Google Malware Keyboard Remote Work Windows 10 Criminal Business Intelligence Business IT Management HaaS Data Breach Settings Cache eWaste Windows Server 2008 Encryption Addiction Managed Service Provider Managed IT VoIP How To Google Apps Tools Mobile Devices Google Drive Mobile Device Management Technology Blockchain History User Error Title II Marketing Upgrade Hosted Solutions Public Cloud Collaboration HIPAA Excel Emergency IT Services Employer-Employee Relationship Passwords Data Recovery Remote Monitoring Office 365 Business Management Apple Software Tips Business Computing IT Consultant Privacy Outsourced IT Tip of the Week Password Frequently Asked Questions Connectivity Private Cloud Money Twitter Managed IT Services Cloud Innovation Netflix Mobile Device Small Business Hardware Managed IT Services Miscellaneous Current Events Automation Backup Disaster Recovery Outlook Data Backup Software Devices Browser Server Evernote Computer Fan User Tips Artificial Intelligence Trending Hackers Accountants Website Google Docs Virtualization Quick Tips Botnet App FENG Security Health Microsoft Productivity IT Plan BYOD Gadgets Leadership Hosted Computing Downtime Data Management Tip of the week Workers Cast Cybersecurity Redundancy Operating System Wi-Fi Router Email

Newsletter Sign Up