Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Texas Professional IT Services LLC Blog

Texas Professional IT Services LLC has been serving the Baytown area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Password Security Needs to Be a Priority

Password Security Needs to Be a Priority

Passwords are everywhere. It seems that every account requires a password, in addition to the devices we use to access these accounts. This is a good thing, as it only helps to increase security - assuming that the password is strong. After all, a password that anyone can guess can hardly be called a password at all.

Unfortunately, recent insights are showing that passwords are not being approached with security in mind.

An examination of passwords that were leaked in 2017, put together by SplashData, showed that the most common passwords in the sample were “123456” and “password.” Not coincidentally, these were also the passwords that were cracked most often for the fourth year in a row. The most recent edition of the University of Phoenix’s annual cybersecurity survey added to this data. This survey’s results showed that password practices are severely lacking:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

These stats are only made worse when other results from this survey are taken into account. Not only have 43 percent of adults experienced a data breach during the last three years, only 29 percent of workplaces include password protections in their official cybersecurity policies.

Clearly, this isn’t an ideal situation. One of the big contributing problems is the fact that many people simply aren’t confident in their ability to remember the recommended random assortment of alphanumeric characters for one account, let alone for each of the numerous accounts that they have.

Fortunately, there are a few tricks and solutions to help meet these standards.

Passphrases
Let’s be honest, something like “kD78Bnd45” isn’t very easy to remember, and as we’ve discussed, it would be even harder to remember a password like this for each account. It also doesn’t help that many passwords also come with length requirements, meaning that the random code becomes even longer and is therefore more difficult to remember.

While using a single word isn’t advisable, as a little social engineering will generally put the cybercriminal on the right track, your security can be boosted by instead using a sentence. This sentence is known as a passphrase.

For example, ‘starwars’ was the 16th most used password in the Splashdata examination discussed above. If someone were to have a social media account filled with Yoda memes and albums from their time at Orlando, Florida’s Star Wars convention, a cybercriminal would probably guess that this person is one of those who uses ‘starwars’ to protect their data. However, if this password was lengthened into a passphrase, like “I really like Star Wars,” it becomes considerably less obvious.

Substitution
A password or passphrase can also be strengthened further by also substituting numbers and symbols in for certain letters. Using our example, “I really like Star Wars,” the likelihood of the passphrase being cracked is diminished even more when it is becomes “1 really l!ke St@r W@rs.”

Using a Password Manager
There are also plenty of programs that are designed with those who have a hard time keeping track of their passwords in mind. Password managers can reduce the number of passwords you have to remember down to one, as the rest are securely saved and able to be populated in the appropriate fields.

Whatever it is you decide to use to assist you in managing your passwords, there are also tools available to help you estimate how effective your passwords will be. For example, one of these tools puts the amount of time it would take for a computer to hack into our “1 really l!ke St@r W@rs” example at 3 octillion years. Compare that to “password,” which would be cracked “instantly.”

For more advice on how to maintain your cybersecurity, keep reading our blog, or reach out to us directly at (832) 514-6260.

How to Best Prepare for Migrating Your Server’s Da...
Tech Term: What Does ‘NAS’ Mean?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Cloud Best Practices Business Computing Cybersecurity Technology Managed IT Services Malware Communications Network Security Hardware Backup Business Outsourced IT Ransomware Wi-Fi Hackers Save Money Software Microsoft Smartphones Email Applications Android Internet Smartphone VoIp Productivity Windows 10 Excel Microsoft Office Phishing Communication VoIP Cloud Computing Google Passwords Social Media Settings Miscellaneous Twitter IT Services Data Breach Data Management Small Business Office Government Data Backup IT Support Bandwidth User Tips Data Holiday Patch Management Access Control Spam Tip of the week Computer Cortana Office 365 Remote Computing Scam Word Business Management Password Mobile Devices VPN Chrome How To Employer-Employee Relationship Automation Hosted Solutions Workers Saving Money Router Physical Security Mobile Device Management Alert Computers Innovation Wireless Charging Battery Virus Website Efficiency Vulnerability Business Continuity Law Enforcement IT Support Analytics Business Intelligence App Tech Terms Browser Managed IT Services Apps Politics Windows Retail Dongle Business Technology Virtual Assistant User Tip Tech Support Printer Server Remote Control Artificial Intelligence Telephony WannaCry BDR Big Data Printers Spam Blocking Internet of Things Machine Learning Remote Support Voice over IP Multi-Factor Security HIPAA Technology Tips Sales Telecommuting Travel Email Management Smart Technology Phone System eCommerce Data Recovery Hard Drive Collaboration Backup and Disaster Recovery Tablet Laptop Education Telecommute Online Shopping Processors Remote Monitoring Hosted Solution Company Culture Hard Drives Knowledge Blockchain Live Streaming Automobile Data loss Apple Gadget Wireless Spyware Files Biometrics Copy SSD WhatsApp Antivirus iPhone HP Access Paste Facebook Comparison IT budget Google Maps Entertainment Staff Virtualization Information Technology Document Management BYOD Specifications IT Management News Hiring/Firing Gadgets Websites Data Protection Server Cybercrime Paperless Office Conferencing Telephone System Staffing Recovery Safety File Sharing Shortcut Marketing Dark Web Digital Telephone Systems Content Filtering Network Attached Storage Cleaning Millennials Google Drive Networking User Security Lead Generation Managed IT Edge Licensing Disaster Recovery Gmail Server Management Botnet Managed IT Service Two-factor Authentication Thank You Congratulations CrashOverride WiFi Inventory Mobile Security Emergency

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520