253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Graemouse Technologies is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 253.777.0763.

Unpaid Invoices Were a $825 Billion Problem Last Y...
ALERT: Meltdown/Spectre Hardware Vulnerability Req...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the week Facebook Comparison Network Disaster Recovery Root Cause Analysis Backup Word Leadership Apps Gadgets iPhone Alert Innovation Wi-Fi Apple Law Enforcement Voice over Internet Protocol Microsoft Hosted Solutions Data Virtualization Employer-Employee Relationship Windows Bandwidth Vulnerability Data Management Malware Outsourced IT Blockchain Downtime Public Cloud Advertising Physical Security Data Recovery Specifications Quick Tips VoIP Content Management Small Business Remote Work Hardware Work/Life Balance Computer Hybrid Cloud Password Business Emergency How To Electronic Medical Records Holiday Avoiding Downtime Passwords Managed IT Services Best Practices Computer Care Budget Identity Theft Networking Telecommuting Efficiency Productivity Patch Management Millennials FENG Two-factor Authentication Computers Network Congestion Software Saving Money Mobile Device Management BDR Private Cloud Office 365 Google Docs Recovery Router Productivity Windows 10s Money CES Spam Trending IT Consultant Settings Flexibility Technology App Netflix Internet of Things Google Drive Cortana Social Media Business Computing Business Intelligence Gmail Operating System Bring Your Own Device Browser Business Management Start Menu Artificial Intelligence Flash Phishing Cloud Knowledge Safety Telephone Systems Staff Network Security Internet Exlporer Data Security Google PDF Password Manager Spam Blocking webinar Big Data Wireless Charging The Internet of Things Ransomware Google Apps Smartphones Government Data Breach Business Mangement Windows Server 2008 IT Support Human Resources Redundancy Credit Cards Automation Communications Social Engineering IT Management Server History HaaS Remote Monitoring Cloud Computing Windows 10 Title II Miscellaneous Communication Cybercrime Frequently Asked Questions Upgrade Hiring/Firing Android BYOD Tools User Error Internet exploMicrosoft Software Tips Criminal Conferencing IT Plan Security Fraud Emails Data loss Collaboration Managed IT Amazon Charger Windows 10 Sync Evernote Keyboard Infrastructure Unsupported Software Travel Legal Data Backup Workers User Tips Smartphone Meetings Internet Mobile Devices Excel Botnet Cybersecurity Business Continuity Humor Multi-Factor Security OneNote Tip of the Week Email Hackers Online End of Support Save Money Data Storage Chrome Solid State Drive HIPAA Privacy Managed IT Services Windows 7

Newsletter Sign Up