(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

NTConnections is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency Business IT Support VoIP Miscellaneous IT Services Managed Service Provider Email Innovation Server Workplace Tips Disaster Recovery Business Continuity Data Windows Upgrade Network Software Hardware Business Management Network Security Save Money Saving Money Communication Computer Smartphones Android Mobile Device Management Virtualization Browser Smartphone communications Holiday User Tips Microsoft Office Managed IT Services Data Backup Outsourced IT Windows 10 WiFi Operating System Mobile Computing Computers Cybercrime Hacking Chrome BYOD Small Business Social Media Remote Monitoring Managed IT Services IT Solutions Big Data Alert Application Apple Proactive IT Avoiding Downtime Passwords Office Marketing Budget Collaboration The Internet of Things Data Recovery Ransomware Quick Tips Social Engineering Automation Information Technology Cloud Computing Employer-Employee Relationship Going Green Remote Computing Mobility Health Bring Your Own Device VPN Recovery spam Gadgets Telephone Systems BDR Private Cloud Bandwidth Compliance Wireless Technology User Error Cybersecurity Two-factor Authentication Internet of Things Vendor Management iPhone How To Save Time Firewall App Managed IT Gmail Artificial Intelligence Networking Mouse Windows 10 Business Intelligence Redundancy Office 365 Data Management Document Management Risk Management PowerPoint Website Excel Phone System Antivirus Office Tips Content Filtering Money Downtime Vulnerability Data Security History Tablet Lithium-ion battery Analytics Router Value Retail IT Support Memory Search Customer Relationship Management Intranet Human Resources SaaS Data Storage Best Available Training Workers Word People Safety Government Programming Network Congestion Business Owner Meetings Trending HaaS OneNote Apps IT Consultant Fax Server Black Market IT Management Work/Life Balance Humor Saving Time Statistics IT Plan Internet Exlporer Data storage CES Online Currency Unsupported Software Biometrics Outlook Public Cloud eWaste Printer Flexibility Phishing Hard Drives Current Events Identity Theft Facebook Administration HIPAA Maintenance Entertainment Credit Cards Running Cable Physical Security DDoS Skype Unified Threat Management Robot Law Enforcement Google Drive Solid State Drive Mobile Office Environment Touchscreen Tip of the week LinkedIn Applications Virus Virtual Desktop Amazon IT service Infrastructure Tools Touchpad Files Relocation Password Virtual Reality FENG Data Protection Debate Productivity Windows Server 2008 Wi-Fi Uninterrupted Power Supply Computer Accessories Amazon Web Services Domains Password Manager Colocation IaaS Bloatware Comparison Electronic Medical Records Online Shopping Windows 7 Video Surveillance Cleaning Cameras Customer Service Consultant Business Mangement Botnet Hosted Solution Computing Infrastructure Data Warehousing Legal Entrepreneur Specifications Education Evernote Regulations Tech Support Printer Server Recycling Hacker Travel End of Support Mobile Device Worker Commute Cost Management Millennials Piracy Wireless Charging Servers Shadow IT Internet exploMicrosoft User Wireless Criminal Science Streaming Media Instant Messaging Root Cause Analysis Workforce Company Culture Licensing Fiber-Optic Flash Windows 8.1 Update Samsung Shortcut Advertising SharePoint Twitter Windows 8 Software as a Service Patch Management Encryption Data loss Telecommuting Cables Bluetooth Sync Crowdfunding Sports Monitor Content Management Tablets Update Scam Charger Software Tips Notifications Remote Work Unified Communications USB Telephony YouTube Reputation Hybrid Cloud Wearable Technology Blockchain Google Docs Print Server Computer Care Windows Media Player Social Theft Start Menu NarrowBand Customers Staff Spam Blocking Voice over Internet Protocol Audit Net Neutrality Hiring/Firing HBO Computer Repair Best Practice Social Networking WIndows 7 Cortana Mobile Keyboard Chromecast Analyitcs Multi-Factor Security Screen Mirroring Frequently Asked Questions Fraud Managing Stress Settings Google Apps Professional Services Laptop Distributed Denial of Service Computer Fan Lifestyle Cast Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar PDF Benefits Loyalty Users Conferencing Digital Signature Windows 10s Smart Technology Battery Experience Two Factor Authentication