window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

TaylorWorks is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 407-478-6600.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 13 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Managed IT Services Privacy Business Computing Hackers Data Backup Email Malware VoIP Hosted Solutions Data Data Recovery Outsourced IT Mobile Devices Google Tech Term Innovation Backup Hardware Internet Microsoft Saving Money Business Continuity Internet of Things Software Cloud Computing User Tips BDR Ransomware Communications IT Services Business Smartphones Android IT Support Cybersecurity Communication Efficiency Small Business Cybercrime Productivity Workplace Tips Network Managed IT Services Disaster Recovery Artificial Intelligence Browser Chrome Applications Law Enforcement Managed IT Computer Business Management Router Windows 10 Gadgets How To Information Windows Virtualization Smartphone Business Intelligence Server Mobile Device Management Save Money IT Support Computers Money Two-factor Authentication BYOD Data Security Data Protection Phishing Avoiding Downtime Collaboration Facebook Identity Theft Miscellaneous Word Upgrade Compliance Social Media Servers Firewall Spam Proactive IT Bandwidth Blockchain Alert Passwords Analysis Redundancy IT Management Apps Telephone Systems Vulnerability Social Engineering Productivity Mobility Training Document Management App Office 365 Connectivity Remote Monitoring File Sharing Data Breach Data Storage CES Sports Work/Life Balance Solid State Drive Flexibility Encryption Machine Learning Spam Blocking Password Information Technology Credit Cards Automation Managed Service Private Cloud Update Content Management Value Operating System Scam Fraud Wi-Fi Access Control Paperless Office Smart Tech Virtual Assistant Data loss Mobile Computing Unified Threat Management Networking Telephone System Workers VPN Infrastructure Business Owner Holiday Settings Microsoft Office Education Bring Your Own Device IT Plan Voice over Internet Protocol Budget Windows 7 OneNote Comparison Keyboard Big Data Employer-Employee Relationship Mobile Device Website Unsupported Software Emails Mouse Regulations Hosted Computing Government Frequently Asked Questions Specifications Enterprise Content Management Root Cause Analysis Business Mangement Save Time Conferencing Risk Management Samsung Skype Evernote Unified Communications Devices Patch Management Network Congestion Remote Worker Hard Drives Software Tips Trending Charger Administrator Wireless Inventory Downtime Smart Office Virtual Private Network Excel Millennials IoT Password Management Computer Fan Business Technology Computing Infrastructure Meetings Botnet Windows 10 Gmail Addiction Strategy YouTube Start Menu Wireless Charging Theft Thought Leadership Virtual Reality Electronic Medical Records IT Consultant Wiring Physical Security Lifestyle Microchip Flash Black Market Content Filtering Proactive Public Cloud Data Warehousing WiFi Project Management Cortana Tip of the week Workforce NIST Instant Messaging FENG Travel Recycling Cache Hacking HIPAA Windows 10s Mobile Augmented Reality Google Apps Streaming Media Worker Commute Leadership GDPR Human Resources Students Legal Entertainment Netflix Amazon Wireless Technology Authentication Battery Remote Monitoring and Maintenance Managed Service Provider Google Docs Warranty Windows Server 2008 Telecommuting Insurance Cryptocurrency USB End of Support Screen Mirroring eWaste Wireless Internet HBO Marketing Hacker Remote Computing SaaS Professional Services The Internet of Things Content Filter E-Commerce Staff Healthcare Cleaning Search Engine Health Office Tips Sync Amazon Web Services Fiber-Optic Nanotechnology Current Events Line of Business PDF Printer Technology Tips Remote Work Practices Safe Mode Recovery Cast Software as a Service Criminal Wire Data Management Outlook Accountants HVAC Audit HaaS Tools Password Manager Storage webinar Camera Digital Signature Electronic Health Records Computer Care Bing Telephony Online Shopping Cables Knowledge MSP Google Drive Multi-Factor Security Users Vendor Management Office Shadow IT Hosted Solution CrashOverride Advertising Customer Service Mobile Office Experience Assessment Colocation Twitter Bluetooth Printers Help Desk History Domains Content Webinar Relocation Search Music Television Politics Techology Public Speaking Audiobook IT solutions Humor Presentation Lithium-ion battery Wearable Technology Public Computer Internet Exlporer Worker Company Culture Video Games Loyalty User Error Transportation Utility Computing 5G Books Hybrid Cloud Tech Support Safety How to IBM Automobile Rootkit Managing Stress Benefits Employer Employee Relationship Hiring/Firing Best Practice Quick Tips Competition Troubleshooting Regulation Fun Internet exploMicrosoft Customer Relationship Management IP Address Scalability Smart Technology Computer Accessories Files Emergency Two Factor Authentication

Mobile? Grab this Article!

QR-Code dieser Seite