window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

TaylorWorks is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 407-478-6600.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Managed IT Services Privacy Network Security Business Computing Data Backup Email Hackers VoIP Malware Hosted Solutions Outsourced IT Data Recovery Mobile Devices Microsoft Tech Term Backup Google Data Software Cloud Computing Business Continuity Internet of Things Innovation Saving Money Hardware Cybersecurity IT Support Internet Small Business Android Efficiency BDR Smartphones Cybercrime Disaster Recovery Communications Ransomware IT Services User Tips Business Applications Network Managed IT Services Communication Law Enforcement Router Managed IT Artificial Intelligence Gadgets How To Virtualization Productivity Business Intelligence Smartphone Mobile Device Management IT Support Two-factor Authentication Collaboration Money Windows Business Management Data Security BYOD Data Protection Phishing Computers Chrome Browser Avoiding Downtime Social Media Telephone Systems Blockchain Spam Mobility Analysis Document Management Bandwidth Proactive IT Computer Alert Passwords Compliance Redundancy IT Management Windows 10 Apps Vulnerability Connectivity Productivity Save Money Social Engineering Office 365 Identity Theft App Remote Monitoring Facebook Word Solid State Drive Access Control Flexibility Paperless Office Business Owner Spam Blocking Smart Tech Holiday Automation Servers Credit Cards Password Education Bring Your Own Device Update Information Technology Private Cloud Server Value Operating System Mobile Device Wi-Fi Work/Life Balance Infrastructure Information Data loss VPN Networking Firewall Workers Budget File Sharing CES Microsoft Office IT Plan Windows 7 OneNote Training Comparison Encryption Big Data Machine Learning Content Management Website Unsupported Software Employer-Employee Relationship Data Breach Miscellaneous Data Storage Upgrade Remote Computing Network Congestion Skype Evernote Samsung Software Tips Trending NIST Downtime Recycling Line of Business Cache Wireless Charger Hard Drives Data Management Excel Computer Fan Millennials Google Apps Streaming Media Recovery Meetings Botnet Windows 10 Authentication Keyboard Electronic Medical Records IT Consultant Start Menu Wireless Charging Computing Infrastructure Human Resources Students Physical Security Lifestyle Insurance Cryptocurrency Flash Fraud eWaste MSP Wireless Internet Data Warehousing Tip of the week FENG Workforce Content Filter Travel Public Cloud Mobile Computing Cortana Fiber-Optic Nanotechnology Leadership Mobile Staff Healthcare Augmented Reality Save Time Windows 10s Practices Safe Mode Risk Management Amazon Criminal Wireless Technology Wire Patch Management Unified Threat Management Netflix Google Docs Windows Server 2008 Telecommuting Password Manager Managed Service Storage Screen Mirroring Managed Service Provider Accountants HVAC SaaS HBO Cables Business Technology Marketing Hacker Workplace Tips Professional Services End of Support Digital Signature The Internet of Things Electronic Health Records Hosted Computing Current Events Sync Amazon Web Services Sports Virtual Reality Scam Cleaning Settings Voice over Internet Protocol Enterprise Content Management Remote Work Health Office Tips Business Mangement Proactive Black Market Content Filtering Cast Software as a Service PDF Hacking Outlook Audit Technology Tips Unified Communications Virtual Assistant Devices Instant Messaging webinar Tools Users Inventory HIPAA Knowledge Telephony Online Shopping HaaS Smart Office Worker Commute Computer Care Multi-Factor Security IoT Password Management Legal Entertainment Regulations Gmail Remote Monitoring and Maintenance Addiction Battery Emails Government Google Drive Frequently Asked Questions Specifications Theft Telephone System Thought Leadership USB Root Cause Analysis Conferencing Strategy YouTube Colocation Domains Benefits Best Practice History Webinar Television Relocation Regulation Troubleshooting Search Company Culture Scalability Public Speaking Smart Technology Techology Presentation Emergency IT solutions WiFi Public Computer Humor Lithium-ion battery Shadow IT Hosted Solution Worker Managing Stress Experience Internet Exlporer Loyalty Tech Support User Error Remote Worker 5G Content Safety Rootkit Hybrid Cloud IBM Music Employer Employee Relationship Politics Wiring Hiring/Firing Audiobook Competition Twitter Customer Relationship Management Quick Tips IP Address Wearable Technology Computer Accessories Fun Internet exploMicrosoft Video Games Two Factor Authentication Transportation Customer Service CrashOverride Files Books Vendor Management Automobile Assessment Office Mobile Office How to Bluetooth Advertising

      Mobile? Grab this Article!

      QR-Code dieser Seite