(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Network Management Services is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (707) 268-8850.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Mobile Devices VoIP Hosted Solutions Innovation Backup Email Google Outsourced IT Tech Term Data Data Recovery IT Support IT Services Internet Microsoft Software Internet of Things Saving Money Cloud Computing Hardware Business Continuity Efficiency Communications BDR Cybersecurity Communication Small Business Ransomware Cybercrime Smartphones Business Android Artificial Intelligence Server Disaster Recovery User Tips How To Alert Network Computers Gadgets Avoiding Downtime Browser Managed IT Services Save Money Smartphone Windows Managed IT Social Engineering Law Enforcement Mobile Device Management Mobility Business Intelligence Two-factor Authentication Windows 10 Collaboration Computer Data Security Data Protection Passwords Router Vulnerability BYOD Business Management Productivity Applications Money Chrome Miscellaneous Phishing Firewall Workplace Tips Social Media Telephone Systems Spam Productivity Connectivity Bandwidth Remote Monitoring Virtualization Redundancy Operating System Document Management Proactive IT IT Support Facebook Budget Identity Theft VPN Compliance Blockchain Office 365 Word Managed Service Provider Flexibility Upgrade Private Cloud Solid State Drive Virtual Assistant Data Breach Infrastructure Quick Tips Holiday Windows 10 Mobile Computing Content Filtering Spam Blocking Employer-Employee Relationship Password Public Cloud Business Owner Sports Wi-Fi Data storage Information Technology Work/Life Balance Value CES Networking Data loss Bring Your Own Device Apps OneNote Comparison Encryption IT Management Windows 7 Information Content Management Paperless Office Microsoft Office Hacking Unified Threat Management Access Control File Sharing Smart Tech Big Data IT Plan Automation Office Tips Managed Service Website Physical Security Update Mobile Device Credit Cards Training Workers Government Analysis Unsupported Software Servers App Data Storage Google Drive Settings Scam eWaste Wire Root Cause Analysis Botnet Fraud Practices Excel Workforce Storage FENG Start Menu Computing Infrastructure Camera Accountants webinar Software Tips Humor PDF NIST Black Market Flash Files Data Management Staff Knowledge Electronic Health Records Google Docs Fiber-Optic Samsung Telephone System Criminal Meetings Reputation Travel Internet Exlporer Keyboard Amazon Charger Hosted Computing Emails Tip of the week Apple Telecommuting Password Manager Mobile Conferencing Cryptocurrency Windows 10s Electronic Medical Records Digital Signature Network Congestion Machine Learning Augmented Reality Data Warehousing Voice over Internet Protocol Hybrid Cloud Hosted Solution Cables Devices Remote Work Smart Office Wireless Technology Customer End of Support Amazon Web Services Inventory Hard Drives Windows Server 2008 iPhone Safe Mode Education Business Mangement Addiction Safety Monitor Professional Services History Legal Risk Management IoT IBM HBO Hacker Sync MSP IT Consultant YouTube The Internet of Things Multi-Factor Security HVAC Recovery Unified Communications Thought Leadership Marketing Save Time Supercomputer Screen Mirroring Software as a Service Internet exploMicrosoft Online Shopping Emergency Gmail Cache CrashOverride Tools Outlook Specifications Audit Cortana Telephony HaaS Remote Worker Strategy Leadership Office Trending Enterprise Content Management Theft SaaS Streaming Media Regulations Students Cast Advertising Evernote Cleaning Authentication Netflix Business Technology Patch Management Recycling Wireless Internet Downtime User Error HIPAA Insurance Frequently Asked Questions Millennials Computer Fan Skype Colocation Wiring Entertainment Relocation Lifestyle Password Management Google Apps Content Filter Hiring/Firing Health Human Resources Current Events Healthcare USB Wireless Charging Computer Care Nanotechnology Worker Commute Wireless Vendor Management Assessment Bluetooth Fun Remote Monitoring and Maintenance Public Speaking Instant Messaging Troubleshooting Transportation Presentation Video Games Books Television Twitter Lithium-ion battery Administration Printers Battery Techology Line of Business How to Regulation Benefits 5G Remote Computing Experience Webinar Tech Support Public Computer Worker Search Content Loyalty Smart Technology Scalability Music IT solutions Competition Best Practice Politics Rootkit Customer Relationship Management IP Address Audiobook Employer Employee Relationship Company Culture Shadow IT Wearable Technology Users Virtual Reality Customer Service Mobile Office Computer Accessories Managing Stress Proactive Automobile Two Factor Authentication Domains WiFi