(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

Network Management Services is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (707) 268-8850.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Malware Data Backup Hackers VoIP Backup Google Hosted Solutions Mobile Devices Email Data Recovery Outsourced IT Innovation IT Support Tech Term Cloud Computing Microsoft Data Software Saving Money Business Continuity Internet of Things Efficiency BDR Hardware Internet Communications Business Ransomware Small Business Cybersecurity Cybercrime IT Services Smartphones Android Disaster Recovery User Tips Managed IT Services Alert Artificial Intelligence Network Server Computers Communication Avoiding Downtime How To Smartphone Gadgets Browser Managed IT Windows Social Media Collaboration Mobile Device Management Chrome Phishing Router Two-factor Authentication BYOD Passwords Business Intelligence Money Save Money Data Security Data Protection Productivity Business Management Social Engineering Vulnerability Law Enforcement Miscellaneous Mobility Upgrade Remote Monitoring Spam Compliance Operating System Virtualization Word Document Management Firewall Connectivity Computer Facebook Productivity Applications VPN Bandwidth Windows 10 Managed Service Provider Redundancy Budget Proactive IT Flexibility IT Support Private Cloud Identity Theft Office 365 Telephone Systems Blockchain Password Public Cloud Credit Cards Employer-Employee Relationship Business Owner IT Plan Analysis Information Technology Data storage Update Workers Work/Life Balance Windows 10 Unsupported Software Infrastructure Data Storage Wi-Fi Servers Data Breach Hacking Content Filtering Spam Blocking Apps CES Office Tips Physical Security Automation Microsoft Office Value Mobile Device Government Data loss Information Content Management Paperless Office Access Control Networking File Sharing App Google Drive Comparison Big Data Smart Tech Bring Your Own Device OneNote Solid State Drive IT Management Website Quick Tips Holiday Windows 7 Business Technology Recycling Wireless Internet Data Management Outlook Specifications Insurance Emergency CrashOverride Files Tools Leadership Reputation Internet Exlporer Trending SaaS Audit Keyboard Apple Telephony Password Management Google Apps Content Filter Cast Human Resources Healthcare Cleaning Netflix Regulations Wireless Charging Nanotechnology Virtual Assistant eWaste Wire Training Frequently Asked Questions Hybrid Cloud Millennials Fraud Practices Patch Management Downtime Hosted Solution Storage Customer End of Support Lifestyle Accountants Hard Drives Computer Fan iPhone Skype NIST Current Events Education Monitor History Staff Electronic Health Records Computer Care Settings Legal Risk Management Fiber-Optic Telephone System Criminal Sports Excel Workforce Amazon Hosted Computing Scam Recovery Root Cause Analysis Botnet Cryptocurrency Password Manager webinar Save Time Software Tips Internet exploMicrosoft Mobile Computing Augmented Reality FENG Start Menu Knowledge Google Docs Wireless Technology Digital Signature Machine Learning Samsung Flash Cables Devices Safety Smart Office Charger Emails HaaS Office Tip of the week Telecommuting IBM Amazon Web Services Inventory Cortana Meetings Travel Hacker Safe Mode Business Mangement Addiction Conferencing Advertising The Internet of Things IoT Mobile Marketing Electronic Medical Records Network Congestion Data Warehousing User Error Voice over Internet Protocol MSP Encryption YouTube Windows 10s HIPAA HVAC Unified Communications Thought Leadership Colocation Entertainment Relocation Windows Server 2008 Remote Work Online Shopping Gmail Cache HBO Workplace Tips Hiring/Firing USB Health Professional Services IT Consultant Multi-Factor Security Strategy Sync Enterprise Content Management Theft Streaming Media PDF Black Market Screen Mirroring Computing Infrastructure Software as a Service Managed Service Students Unified Threat Management Humor Evernote Authentication Supercomputer Mobile Office Rootkit Instant Messaging Troubleshooting Employer Employee Relationship Domains Wiring Managing Stress Video Games Battery Administration Wireless Proactive Techology How to Computer Accessories Public Speaking Remote Computing Experience WiFi Presentation Remote Monitoring and Maintenance Search Two Factor Authentication Lithium-ion battery Vendor Management Content Twitter Bluetooth Assessment Scalability Music 5G Line of Business Best Practice Politics Tech Support Regulation Audiobook Transportation Shadow IT Books Television Wearable Technology Virtual Reality Competition Webinar Customer Relationship Management Benefits IP Address Worker Automobile Public Computer Worker Commute Remote Worker Company Culture Loyalty Users IT solutions Fun Customer Service Smart Technology