(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

TaylorWorks is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 407-478-6600.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Managed IT Services Network Security Privacy Technology Best Practices Business Computing Hackers Data Backup VoIP Microsoft Software Backup Email Outsourced IT Malware Google Business Continuity Mobile Devices Small Business Saving Money IT Support Hosted Solutions Cloud Computing Disaster Recovery Android Data Recovery Efficiency Innovation Business How To Smartphones Hardware Cybersecurity Data Managed IT User Tips BDR Cybercrime Law Enforcement Communication Communications Internet of Things Ransomware Avoiding Downtime Chrome Two-factor Authentication Managed IT Services Social Engineering Computers Gadgets Compliance Browser Virtualization Mobility Internet Windows Telephone Systems Router Proactive IT Data Security Business Management Windows 10 Phishing IT Services App Remote Monitoring Spam Business Intelligence Mobile Device Management Money Collaboration Alert BYOD IT Management Artificial Intelligence Apps Save Money Workers IT Plan Budget CES Vulnerability Unsupported Software Firewall Employer-Employee Relationship Identity Theft Flexibility Information Technology Word Smartphone Social Media Credit Cards Productivity Network Server Work/Life Balance Wi-Fi Computer Bring Your Own Device Passwords Redundancy Data Protection OneNote Comparison Office 365 Solid State Drive Data Storage Data Breach Business Owner Private Cloud Holiday Spam Blocking Document Management Operating System Value Bandwidth Criminal Windows 10s Google Docs Telecommuting Networking Windows Server 2008 Meetings Productivity PDF The Internet of Things Cables Professional Services Black Market Voice over Internet Protocol SaaS Remote Work Current Events Windows 7 Hacking HaaS Google Drive Big Data Unified Communications Tools HIPAA Training Battery Facebook Content Management Audit Users Multi-Factor Security Knowledge Regulations Upgrade Theft Emails Remote Computing Software Tips Education Content Filtering Blockchain Trending Network Congestion Servers Data Management Wireless Computing Infrastructure Windows 10 Google Apps Botnet Charger Physical Security Applications Human Resources Computer Fan Lifestyle Fraud IT Consultant Flash Electronic Medical Records Infrastructure Travel Data loss Cortana Staff FENG Mobile Computing End of Support Wireless Technology Amazon Leadership Keyboard Password Manager Netflix Unified Threat Management Screen Mirroring HBO Virtual Reality Office Tips Hacker Digital Signature Health Marketing Amazon Web Services Sync Microsoft Office Business Mangement Settings Software as a Service Cast Outlook Worker Commute Patch Management Technology Tips Website Online Shopping webinar Telephony Legal Gmail Government Computer Care Frequently Asked Questions Scam Password Specifications Evernote Conferencing Skype Recovery Hard Drives Recycling Update Samsung Excel Downtime Millennials Public Cloud Wireless Charging IT Support Start Menu Mobile Device eWaste Data Warehousing Workforce Tip of the week Save Time Root Cause Analysis Fiber-Optic Mobile Risk Management Troubleshooting Tech Support Loyalty Smart Technology Safety Politics Rootkit Hosted Solution Hiring/Firing Quick Tips Competition Fun Video Games Automobile Two Factor Authentication Miscellaneous Colocation Vendor Management Assessment Search Webinar Scalability Television Books Presentation Internet Exlporer IT solutions Public Computer Content 5G Workplace Tips Managed Service Provider IBM Emergency Internet exploMicrosoft Audiobook Employer Employee Relationship Instant Messaging Experience Customer Relationship Management Cleaning IP Address Encryption Files Advertising Entertainment Computer Accessories How to Music Customer Service Office Mobile Office History CrashOverride Domains Bluetooth Best Practice Wearable Technology Automation Transportation Relocation Techology Public Speaking Shadow IT USB WiFi Benefits Humor Lithium-ion battery User Error Augmented Reality Hybrid Cloud Worker

      Mobile? Grab this Article!

      QR-Code dieser Seite