Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

SplashData collected and examined passwords that were leaked in 2017, resulting in the most common passwords being “123456” and “password.” These also happened to be the most cracked passwords for the past four years. The University of Phoenix’s annual cybersecurity survey has also provided some interesting insights:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

Furthermore, 43 percent of adults have experienced a data breach over the past three years, and 29 percent of workplaces have password protection as an official part of their cybersecurity policies. While these statistics aren’t the best situation, it’s important to understand why this is the case. One of the biggest issues regarding password security is that people don’t have enough confidence in their ability to remember complex passwords. This is augmented by the fact that multiple passwords are needed to ensure all accounts are secure. You can use some tips and tricks to remember them, though.

A random string of letters, numbers, and symbols simply isn’t user-friendly or easy to remember. When you’re restricted by length and content requirements, implementing a password that is easy to remember is borderline impossible. Since you don’t want to use just a single word either, you can boost the security of your password by lengthening it into a passphrase--sort of like a secret phrase that you, and only you, should know.

For example, the phrase “starwars” was one of the most used passwords in the SplashData survey. If information on a user’s social media profile indicates that they are a Star Wars fan, a cybercriminal could use this information to guess the password and cause all sorts of trouble. By lengthening your password into a full sentence, like “I really like star wars,” you can drastically improve security for your account.

If security is a further issue, you can improve the strength of your passwords by replacing numbers and symbols for specific letters. For example, the previous example of “I really like Star Wars” can be changed to “1 really l!ke St@r W@rs.” This makes it more difficult for a hacker to guess the password.

Implement a Password Manager
The security industry is completely aware of how difficult passwords are to remember. This is why password managers have become a major implementation of any security-minded organization. Instead of having to remember multiple complex passwords, a password manager provides a secure vault for storage of any complex passwords, all of which are controlled by a master password.

Does your business need help with cybersecurity? Velocity Technology Partners has the solution. To learn more, reach out to us at (800) - 983 - 5765.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Congratulations Application Passwords Law Enforcement Hosted Solution Data Protection Memory Gmail History eWaste Shortcut Microsoft Word Computer Forensics Business OneNote Software as a Service VoIp Identity WIndows Server 2008 Phishing Update Microsoft Office Artificial Intelligence Antivirus Backup Fraud Hard Drive Compliance Wi-Fi Legal Business Continuity Browser Cloud Managing Stress Data Content Filtering Managed Service Provider File Sharing Automation Saving Money Outlook iPhone IoT Data Recovery SaaS Google Docs Comparison Data Backup Hosted Solutions Cleaning Data Privacy Microsoft Tech Term Chromebook Innovation Cortana Twitter Collaboration IT Support Windows Ink Sports Smart Tech Efficiency Sync Big Data Data Management Router Politics Office 365 Microsoft Excel IT budget Mobility Spyware Word Communications Identities Managed IT Apps Spam Network Security Business Computing Cybersecurity Vulnerability Technology BDR Safety Unsupported Software Telephone Google Maps Thank You Data Theft IT Services Language Flexibility Computer Updates Encryption User Tips Security HBO Smartphone Work/Life Balance Software Android VPN Company Culture Emergency WiFi Proactive Project Management Blockchain Mobile Device Management Employer-Employee Relationship Gadgets FAQ WannaCry Apple Mobile Security Lifestyle Monitoring Ciminal Workers Applications Server Identity Theft Google Drive Remote Monitoring Connectivity Hardware Conferencing Specifications Commerce Adobe Management Patch Management Disaster Recovery Edge Mobile Devices Telephone Systems Financial Technology MSP Managed IT Services Tech Support Best Practices Data Storage Tip of the Week Wireless Technology Data Breach Google IT support Evernote Business Management Windows Students Devices Virus Vendor Management Malware Wireless Charging Softphones Marketing Gifts App Social Media Remote Computing Two-factor Authentication PowerPoint Alert Windows 10 Charger Networking Ransomware Audit Storage Travel Data Security Printing Cloud Computing Money Cybercrime Risk Management Cast Excel Computers Screen Mirroring Proactive IT Chrome Financial Personal Information App store NFL Credit Cards Gamification Government Productivity User Error Analysis Device Security Education IT Management Licensing Privacy Social Engineering Legislation intranet The Internet of Things BYOD Maintenance Sales Virtualization Computing Wireless Internet Internet of Things Email Holiday Best Practice Tablets Value Data Loss IT Solutions Content Filter Redundancy Streaming Media Network Communication Internet Cost Management Google Assistant Outsourced IT Small Business Websites Hackers Operating System Smartphones Unified Communications Retail