(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Network Management Services is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (707) 268-8850.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 17 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Hosted Solutions Mobile Devices Google Email Tech Term Outsourced IT Data Data Recovery IT Support IT Services Cloud Computing Saving Money Internet Microsoft Internet of Things Software Business Continuity Efficiency Hardware Communications BDR Cybercrime Business Smartphones Cybersecurity Ransomware Communication Small Business User Tips Server Disaster Recovery Android Artificial Intelligence Gadgets Browser Avoiding Downtime Save Money How To Managed IT Network Computers Alert Managed IT Services Smartphone Windows Social Engineering Chrome Law Enforcement BYOD Firewall Phishing Applications Miscellaneous Social Media Workplace Tips Mobile Device Management Business Intelligence Mobility Two-factor Authentication Money Windows 10 Business Management Computer Data Security Data Protection Passwords Collaboration Vulnerability Router Productivity Budget Facebook Remote Monitoring Office 365 Word Connectivity Operating System Productivity Virtualization Upgrade Bandwidth Flexibility Spam Telephone Systems Proactive IT VPN IT Support Redundancy Managed Service Provider Identity Theft Document Management Private Cloud Blockchain Compliance Windows 7 Microsoft Office Credit Cards Training Workers Analysis Quick Tips Settings Public Cloud Employer-Employee Relationship Big Data IT Plan Data Breach Website Update Infrastructure Content Filtering Office Tips Data storage Unsupported Software Mobile Device Information Servers Sports Data Storage App File Sharing Value Solid State Drive Windows 10 Mobile Computing Hacking Managed Service Spam Blocking CES Networking Holiday Bring Your Own Device Wi-Fi Password Business Owner Encryption Unified Threat Management Physical Security Information Technology Content Management Paperless Office Automation Access Control Government Data loss Work/Life Balance Smart Tech Virtual Assistant Apps OneNote Comparison Google Drive IT Management Recovery Recycling Wireless Internet Patch Management Screen Mirroring Software as a Service Insurance Telephone System Google Apps Content Filter Humor CrashOverride Tools Save Time Cryptocurrency Computing Infrastructure Outlook Specifications Computer Care Audit Telephony Human Resources Healthcare Current Events Files Trending Wireless Charging Nanotechnology Reputation Internet Exlporer Regulations eWaste Wire Scam Apple Cast HaaS Fraud Practices Millennials Storage Downtime Accountants webinar Safe Mode Frequently Asked Questions Samsung MSP Hybrid Cloud Computer Fan Skype Staff Electronic Health Records Knowledge HVAC Lifestyle HIPAA Fiber-Optic Customer End of Support Criminal Hard Drives iPhone Entertainment Amazon Hosted Computing Charger Emails Excel Workforce USB Password Manager Root Cause Analysis Botnet Conferencing Monitor History Cables Devices Remote Worker FENG Start Menu Digital Signature Machine Learning Electronic Medical Records Network Congestion Enterprise Content Management Software Tips Internet exploMicrosoft Flash PDF Black Market Smart Office Google Docs Amazon Web Services Inventory Tip of the week Telecommuting Business Mangement Addiction Meetings Travel Data Management IoT Business Technology Unified Communications Thought Leadership Office Wiring Mobile YouTube IT Consultant Cortana Password Management Keyboard Advertising Windows 10s Supercomputer Augmented Reality Data Warehousing Voice over Internet Protocol Online Shopping Windows Server 2008 Remote Work Hosted Solution Gmail Cache Emergency Wireless Technology User Error Theft Streaming Media SaaS Relocation Camera Safety Professional Services Strategy Leadership NIST IBM Colocation HBO Cleaning Netflix Marketing Hacker Sync Education Students Hiring/Firing The Internet of Things Health Multi-Factor Security Legal Risk Management Evernote Authentication Content Scalability Music Fun Competition Printers Managing Stress Computer Accessories Customer Relationship Management Line of Business IP Address Two Factor Authentication Best Practice Politics Users Regulation Shadow IT Audiobook Vendor Management Wearable Technology Assessment Bluetooth Customer Service Administration Mobile Office Virtual Reality Transportation Domains WiFi Twitter Books Television Search Wireless Automobile Worker Commute Webinar Benefits Public Speaking Instant Messaging Troubleshooting Public Computer Presentation Worker Loyalty Lithium-ion battery Video Games IT solutions Proactive Battery Smart Technology How to 5G Techology Rootkit Tech Support Experience Company Culture Employer Employee Relationship Remote Computing Remote Monitoring and Maintenance