Velocity Technology Partners Blogs

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

SplashData collected and examined passwords that were leaked in 2017, resulting in the most common passwords being “123456” and “password.” These also happened to be the most cracked passwords for the past four years. The University of Phoenix’s annual cybersecurity survey has also provided some interesting insights:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

Furthermore, 43 percent of adults have experienced a data breach over the past three years, and 29 percent of workplaces have password protection as an official part of their cybersecurity policies. While these statistics aren’t the best situation, it’s important to understand why this is the case. One of the biggest issues regarding password security is that people don’t have enough confidence in their ability to remember complex passwords. This is augmented by the fact that multiple passwords are needed to ensure all accounts are secure. You can use some tips and tricks to remember them, though.

Passcodes
A random string of letters, numbers, and symbols simply isn’t user-friendly or easy to remember. When you’re restricted by length and content requirements, implementing a password that is easy to remember is borderline impossible. Since you don’t want to use just a single word either, you can boost the security of your password by lengthening it into a passphrase--sort of like a secret phrase that you, and only you, should know.

For example, the phrase “starwars” was one of the most used passwords in the SplashData survey. If information on a user’s social media profile indicates that they are a Star Wars fan, a cybercriminal could use this information to guess the password and cause all sorts of trouble. By lengthening your password into a full sentence, like “I really like star wars,” you can drastically improve security for your account.

Substitution
If security is a further issue, you can improve the strength of your passwords by replacing numbers and symbols for specific letters. For example, the previous example of “I really like Star Wars” can be changed to “1 really l!ke St@r W@rs.” This makes it more difficult for a hacker to guess the password.

Implement a Password Manager
The security industry is completely aware of how difficult passwords are to remember. This is why password managers have become a major implementation of any security-minded organization. Instead of having to remember multiple complex passwords, a password manager provides a secure vault for storage of any complex passwords, all of which are controlled by a master password.

Does your business need help with cybersecurity? Velocity Technology Partners has the solution. To learn more, reach out to us at (800) - 983 - 5765.

Have You Considered Outsourced Project Management?
4 Uses for Blockchain that Don’t Involve Cryptocur...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

BDR Blockchain Storage Technology Identity Bring Your Own Device Updates Chromebook Identities Evernote Windows Social Media Mobility Fraud Best Practice Smartphones Virus Big Data Gmail Marketing Chrome Business Computing Mobile Security Cost Management Passwords Managed IT services NFL App store Apple IT support Phishing Sync Two-factor Authentication WiFi Holiday Networking Hackers Disaster Recovery Data Theft Government Apps Operating System OneNote Saving Money Company Culture Ciminal Redundancy WannaCry Monitoring Audit History SaaS Sales Regulation Internet Streaming Media Cybersecurity Data Recovery Microsoft Excel Employer-Employee Relationship Wi-Fi Adobe Data Management PowerPoint Law Enforcement Computing VoIp Screen Mirroring eWaste Data Protection Tech Support Outlook Data Loss IoT Software as a Service Encryption Collaboration Financial Technology Google Data Storage Credit Cards Managed IT Politics Telephone Systems Edge User Tips Proactive IT App Comparison Hardware IT Support Microsoft Office Legal Telephone Specifications Ransomware Antivirus FAQ Office 365 Google Drive Hosted Solution Cybercrime Management Application Wireless Internet iPhone Business Management Spyware Commerce Excel Virtualization Data Backup Flexibility Server Microsoft Compliance Emergency Business Continuity Privacy Smartphone Personal Information IT Solutions Google Docs Network Security Hybrid Cloud Retail Lifestyle Internet of Things Education File Sharing Email Charger Unified Communications WIndows Server 2008 Vendor Management MSP Language Managing Stress Safety Social Engineering Remote Computing Mobile Devices Artificial Intelligence Vulnerability Work/Life Balance Unsupported Software Proactive Workers User Error Automation Small Business Thank You Content Filtering Efficiency Data Security Financial intranet Gadgets Smart Tech Connectivity Computer Managed Service Provider Alert Malware Wireless Charging Patch Management Windows Ink Tech Term Productivity Content Filter Cortana Data Breach Browser Computers Data Security Softphones Shortcut IT Management BYOD Sports Computer Forensics Communication Congratulations Hard Drive Business Cast Managed IT Services Network Device Security Android Travel Word Gamification Google Assistant VPN Devices Communications Memory Cleaning Licensing Best Practices Data Privacy Mobile Device Management Legislation Students Cloud Computing Cloud Google Maps Gifts IT Services Microsoft Word Wireless Technology Update IT budget Printing HBO Tip of the Week Conferencing Spam Router Backup Websites Innovation Maintenance Windows 10 Twitter The Internet of Things Tablets Remote Monitoring Analysis Project Management Money Outsourced IT Applications Value Software Identity Theft Risk Management Hosted Solutions