4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

SplashData collected and examined passwords that were leaked in 2017, resulting in the most common passwords being “123456” and “password.” These also happened to be the most cracked passwords for the past four years. The University of Phoenix’s annual cybersecurity survey has also provided some interesting insights:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

Furthermore, 43 percent of adults have experienced a data breach over the past three years, and 29 percent of workplaces have password protection as an official part of their cybersecurity policies. While these statistics aren’t the best situation, it’s important to understand why this is the case. One of the biggest issues regarding password security is that people don’t have enough confidence in their ability to remember complex passwords. This is augmented by the fact that multiple passwords are needed to ensure all accounts are secure. You can use some tips and tricks to remember them, though.

A random string of letters, numbers, and symbols simply isn’t user-friendly or easy to remember. When you’re restricted by length and content requirements, implementing a password that is easy to remember is borderline impossible. Since you don’t want to use just a single word either, you can boost the security of your password by lengthening it into a passphrase--sort of like a secret phrase that you, and only you, should know.

For example, the phrase “starwars” was one of the most used passwords in the SplashData survey. If information on a user’s social media profile indicates that they are a Star Wars fan, a cybercriminal could use this information to guess the password and cause all sorts of trouble. By lengthening your password into a full sentence, like “I really like star wars,” you can drastically improve security for your account.

If security is a further issue, you can improve the strength of your passwords by replacing numbers and symbols for specific letters. For example, the previous example of “I really like Star Wars” can be changed to “1 really l!ke St@r W@rs.” This makes it more difficult for a hacker to guess the password.

Implement a Password Manager
The security industry is completely aware of how difficult passwords are to remember. This is why password managers have become a major implementation of any security-minded organization. Instead of having to remember multiple complex passwords, a password manager provides a secure vault for storage of any complex passwords, all of which are controlled by a master password.

Does your business need help with cybersecurity? 4IT has the solution. To learn more, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Hardware VoIP Business Continuity Workplace Tips Network Security Mobile Devices User Tips Computer Saving Money Windows 10 Mobile Device Management Miscellaneous Virtualization Upgrade Data Server Email communications Alert Mobile Computing Small Business Network Microsoft Office Communication Save Money Smartphone Social Media Smartphones Quick Tips Apps Managed IT Services Outsourced IT BYOD Going Green Information Technology Mobile Office Productivity Browser Gadgets Office Health Holiday Cybercrime Android Managed IT Ransomware Cybersecurity Operating System Chrome Application WiFi Data Backup Mobility Passwords Best Practice Disaster Risk Management Firewall Tablet The Internet of Things Avoiding Downtime History Remote Computing Telephone Systems Unified Threat Management IT Solutions Spam Automation BDR Search Collaboration Data Management Data Recovery Internet of Things Facebook Remote Monitoring Employer-Employee Relationship Budget Hard Drives Saving Time Apple User Error Hacking Vendor Management Marketing Phishing VPN Wireless Technology Customer Relationship Management Maintenance Big Data Phone System Law Enforcement Content Filtering Recovery Office 365 Proactive IT Data Security Office Tips Money Password Vulnerability Hosted Solution Computers iPhone Telephony PowerPoint Printer Tech Support Virus USB Work/Life Balance Encryption Analytics Gmail Router Two-factor Authentication Government App Bring Your Own Device Intranet Antivirus Lithium-ion battery Shortcut IT Support Social OneNote Humor Google Drive Administration Current Events Social Engineering Wearable Technology Identity Theft Data Protection Flexibility Private Cloud Users Outlook Windows 8 SaaS Excel Politics Cost Management Audit Personal Information HaaS Bandwidth Printer Server Business Intelligence Wireless Point of Sale Laptop Unsupported Software IT COnsultant Windows 10 Retail Cloud Computing Computer Repair Data Breach Trending Education Save Time Net Neutrality Managed IT Services Instant Messaging Emails Solid State Drive Google Docs Redundancy Sports Data Storage Augmented Reality HIPAA Social Networking Entertainment Benefits Paperless Office DDoS Computer Accessories Fax Server Mouse Samsung Compliance Wi-Fi Workplace Emergency Artificial Intelligence eWaste Streaming Media Applications Uninterrupted Power Supply Managing Stress online currency hacker Cortana Transportation Network Congestion Project Management Battery Robot Computer Care Travel Help Desk Automobile Efficency Update Customer Service Biometrics Blockchain End of Support Commerce Virtual Reality Networking Internet Exlporer Meetings Legal Data Loss Display Device Security Amazon Adobe Reliable Computing Co-managed IT Computer Fan Employer Employee Relationship Worker Commute Devices Hard Drive Operating Sysytem Licensing Bloatware Dark Web Lifestyle PDF Microsoft Excel Credit Cards Ebay Files Screen Mirroring Scalability Uograde Spyware Images Computing IT Budget Branding Safety Text Messaging File Sharing FAQ Chromecast Cast Distributed Denial of Service Sales How To Upgrades Fraud Windows 10s Nanotechnology WIndows 7 systems Charger Administrator Storage Training Inbound Marketing Consultant Regulations Edge Colocation Tablets Hard Disk Drive Root Cause Analysis The Blindside Of hack Black Market Wireless Charging Wiring Access HBO Twitter Company Culture Value Touchscreen Cameras Information Ciminal NFL best practices CrashOverride Surge Protector User IT Security WannaCry IT Management Television Science Cleaning Debate Presentation Experience 3D Printing Word data breach Virtual Desktop Settings Bluetooth Best Available Keyboard Avoid Downtime Legislation Evernote WIndows Server 2008 IT Technicians Music MSP Windows Ink risk management SharePoint Hiring/Firing ISP Comparison Workers Data storage Patch Management Nokia Books Google Maps Teamwork Smart Technology Programming Video Games Specifications Blogging Document Management Updates Regulation Busines Continuity Near Field Communication Identities Advertising Software as a Service Conferencing Website Microsoft Word Touchpad Sync Mobile Device IT consulting Managed Security IoT iOS Human Resources Managed IT Service Running Cable Scam OneDrive Gifts Taxes Language Webinar Supercomputer Electronic Medical Records Tech Term Youtube Microblogging Mobile IT solutions Proactive Reputation Professional Services Websites Managed Service Provder Tutorial Webinar IT service Domains Shadow IT Relocation Gift Giving Buisness