(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

NTConnections is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Hosted Solutions Internet Malware Backup Google Mobile Devices Efficiency VoIP IT Support Business IT Services Email Network Security Miscellaneous Managed Service Provider Server Data Innovation Network Disaster Recovery Business Continuity Workplace Tips Software Windows Upgrade Business Management Communication Saving Money Hardware Mobile Device Management Android Virtualization Computer Browser Smartphone Save Money Managed IT Services Data Backup User Tips communications Smartphones Cybercrime Microsoft Office Holiday BYOD WiFi Windows 10 Outsourced IT Computers Small Business Data Recovery Hacking Chrome Big Data Social Media Remote Monitoring Operating System Mobile Computing Ransomware Cloud Computing VPN Managed IT Services Apple Proactive IT Application Avoiding Downtime Automation Internet of Things IT Solutions Collaboration Alert BDR Employer-Employee Relationship Information Technology Passwords Marketing The Internet of Things Office Budget Social Engineering Quick Tips Bring Your Own Device Gadgets spam Cybersecurity Going Green Remote Computing Bandwidth Managed IT Recovery Tech Term Mobility Health Telephone Systems Gmail iPhone Private Cloud Website Router Vulnerability Data Security Save Time Firewall Redundancy Artificial Intelligence Two-factor Authentication Data Protection How To Compliance Business Intelligence Vendor Management Wireless Technology IT Support User Error App Antivirus Lithium-ion battery Productivity Windows 10 PowerPoint Analytics Excel Phone System Content Filtering Money Downtime Mouse Identity Theft History Tablet Value Office 365 Data Management Retail Memory Search Phishing Apps Networking Document Management Office Tips Risk Management Law Enforcement Applications Humor Statistics Smart Tech IT Plan Physical Security DDoS Robot Current Events Workers CES Environment Maintenance Unsupported Software Google Drive Outlook Business Owner Update Human Resources OneNote SaaS Training Flexibility Safety Mobile Device Government Administration Cleaning Work/Life Balance Intranet Meetings Credit Cards Entertainment HaaS Running Cable Fax Server Black Market Skype Data loss Unified Threat Management Mobile Office Public Cloud Streaming Media Customer Relationship Management Internet Exlporer Infrastructure IT Consultant Data Storage Data storage Encryption Best Available Biometrics HIPAA People Word Saving Time Comparison Programming eWaste Network Congestion Trending Hard Drives Online Currency Facebook Printer IT Management Solid State Drive Best Practice Social Networking Wireless Charging Servers User Wireless Internet Chromecast Criminal Files Password Analyitcs Workforce Print Server FENG Licensing Wi-Fi Samsung Fiber-Optic Flash Software as a Service Twitter Laptop Settings Colocation Insurance Telecommuting Electronic Medical Records Distributed Denial of Service Crowdfunding Virtual Desktop Net Neutrality Cables Computer Repair Sync Touchpad Hosted Solution IT service Content Management Computing Infrastructure Practices Legal Virtual Reality Remote Work Software Tips Relocation Uninterrupted Power Supply Unified Communications Telephony Google Docs Domains Blockchain End of Support Hosted Computing Bloatware Windows Media Player IaaS Customer Service Touchscreen Theft Start Menu Voice over Internet Protocol Audit Staff Internet exploMicrosoft Inventory Entrepreneur HBO Root Cause Analysis Hiring/Firing Tech Support Cortana Mobile WIndows 7 Multi-Factor Security Screen Mirroring Patch Management Digital Signature Advertising Hacker Access Control Cost Management Fraud Frequently Asked Questions Thought Leadership Shadow IT Google Apps Professional Services Managing Stress Science Lifestyle Cast Scam Wireless Strategy Authentication LinkedIn Instant Messaging Amazon Tip of the week Virus Charger Content Filter Shortcut Tools Windows 8 Debate SharePoint Analysis Hybrid Cloud Nanotechnology Amazon Web Services Windows Server 2008 Computer Accessories Computer Care Storage Sports Password Manager Bluetooth Tablets Spam Blocking Monitor Accountants PDF Notifications Connectivity Video Surveillance Company Culture Online Shopping Windows 7 Cameras Consultant Addiction YouTube Keyboard Business Mangement USB Windows 8.1 Update Botnet Specifications Data Warehousing Reputation Education Wearable Technology Devices Social Evernote Regulations Printer Server Cache NarrowBand Recycling Travel Millennials Computer Fan Worker Commute Customers Piracy IoT Assessment Music Television Wire Troubleshooting Techology Users Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication