window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

TaylorWorks is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 407-478-6600.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Hosted Solutions Managed IT Services Hackers Data Recovery Malware Mobile Devices VoIP Google Email Data User Tips Outsourced IT Tech Term Innovation Internet of Things Cloud Computing Internet Productivity Microsoft Communications Backup Hardware Business Continuity IT Services Business BDR Cybersecurity Software Efficiency Artificial Intelligence Saving Money Smartphones Ransomware Communication Small Business Android Smartphone IT Support IT Support Managed IT Services Router Disaster Recovery Cybercrime Chrome Workplace Tips Network Gadgets Browser Business Management Applications Windows 10 Managed IT How To Computer Mobile Device Collaboration Phishing Law Enforcement Training Avoiding Downtime Spam Information Save Money Computers Mobile Device Management Encryption Virtualization Two-factor Authentication Word Server Blockchain Business Intelligence Access Control Money Holiday Proactive IT Mobility BYOD Data Security Windows Office 365 Data Protection Voice over Internet Protocol Firewall Social Media Connectivity Software as a Service File Sharing Remote Monitoring App Facebook Machine Learning Wi-Fi Managed Service Identity Theft Automation Passwords Private Cloud Servers Apps Telephone Systems Bandwidth Productivity Analysis Alert Document Management Redundancy IT Management Miscellaneous Social Engineering Vulnerability Compliance Upgrade Settings OneNote IT Plan Employer-Employee Relationship CES Sports Windows 7 Google Drive Comparison Scam Data Breach Telephony Unsupported Software Solid State Drive Content Management Data Storage Flexibility Information Technology Business Technology Password Spam Blocking Paperless Office Update Credit Cards Botnet Virtual Assistant Smart Tech Value Operating System Business Owner Education Bring Your Own Device Hacker Fraud Microsoft Office Human Resources Budget Data loss Keyboard Telephone System Infrastructure Networking Big Data VPN Unified Threat Management Mobile Computing Work/Life Balance Website Healthcare Workers Google Docs Save Time Health Sync Amazon Web Services Technology Tips Bing Digital Signature Electronic Health Records MSP Multiple Versions Cables Wireless Mouse webinar Cast HaaS Digital Signage Hosted Computing Audit Remote Work Business Mangement Knowledge Tools Windows 10 Display Enterprise Content Management Computer Care Outlook Virtual Reality Devices Online Shopping Help Desk Emails Multi-Factor Security Black Market Content Filtering Remote Worker Restore Data Unified Communications Administrator Smart Office Conferencing Government Instant Messaging Google Search Inventory Regulations Hacking Hard Drives Virtual Private Network Gmail Addiction Network Congestion Root Cause Analysis HIPAA Security Cameras IoT Password Management Samsung Frequently Asked Questions Specifications Worker Commute Theft Thought Leadership Downtime Skype Evernote Legal Entertainment Augmented Reality Shortcuts Strategy YouTube Charger Software Tips Trending Battery Wiring Backup and Disaster Recovery Wireless Technology Microchip USB Computing Infrastructure Proactive Computer Fan Project Management Recycling Cache Electronic Medical Records IT Consultant Meetings Remote Computing Employee/Employer Relationship NIST Excel Millennials GDPR Google Apps Streaming Media Start Menu Wireless Charging The Internet of Things eCommerce Physical Security Lifestyle Marketing Public Cloud Data Management Cortana Students Data Warehousing WiFi Recovery Remote Monitoring and Maintenance Authentication FENG Flash Warranty eWaste Wireless Internet Leadership Travel Smartwatch Insurance Cryptocurrency Windows 10s Tip of the week Workforce E-Commerce Content Filter Mobile Social Netflix Managed Service Provider Amazon Search Engine Staff Users End of Support Line of Business File Versioning Fiber-Optic Nanotechnology Printer Criminal Wire Screen Mirroring Employee Practices Safe Mode SaaS Windows Server 2008 Telecommuting PDF Camera Password Manager Storage Current Events Professional Services Risk Management Office Tips Vendor Accountants HVAC Cleaning HBO Patch Management Content Domains Quick Tips Fun Internet exploMicrosoft Computer Accessories Music Printers Twitter Two Factor Authentication Politics Files CrashOverride Audiobook Public Speaking Office Vendor Management Advertising Presentation Bluetooth Wearable Technology Colocation Assessment Lithium-ion battery Video Games History Transportation Relocation Webinar Books Search Automobile 5G How to Tech Support Net Neutrality Television Safety IBM Techology Benefits Best Practice Humor Company Culture IT solutions Utility Computing Worker Troubleshooting Internet Exlporer ISP Public Computer Competition Scalability Customer Relationship Management User Error Loyalty Smart Technology Hybrid Cloud Managing Stress Emergency IP Address Rootkit Shadow IT Hosted Solution Hiring/Firing Employer Employee Relationship Experience Customer Service Regulation Mobile Office

Mobile? Grab this Article!

QR-Code dieser Seite