Contact us today!

FRS Pros Blog

Do You Know How to Build Solid Passwords?

Do You Know How to Build Solid Passwords?

The password is the core element of both data security and user authentication. This makes the construction of them extremely important to protecting digital assets. Unfortunately, not everyone understands how to construct passwords that actually work to protect the information on the other side. Today, we will discuss how to build a solid password that works to keep your digital resources safe.

Password hygiene, as it is known, is the practice of securing your accounts with the use of passwords that are difficult to guess, even for a machine. If you have good password hygiene, you will avoid using authentication methods that could easily be compromised. Here is a list of commonly used strategies for passwords that would be considered unhygienic:

  • Personal details, like your name or birthday
  • Names of friends, family, or most infamously, your pets
  • Commonly used words (like “password” or a favorite sports team)
  • Simple keyboard patterns (like “12345” or “qwerty”)
  • Repeated login credentials (like username: David1973, password: David1973)
  • Making their passwords as short as possible

If this short list stops you in your tracks, don’t panic. We’re going to give you some strategies you can immediately use to improve your password hygiene and secure your accounts. The constant development of tools and strategies designed to crack passwords has changed the way password creation has been approached in recent years. Here are some examples of some password creation strategies that are no longer recommended: 

  • Alphanumeric Switching: You know the practice. You switch some letters with numbers that look like them to create the appearance of security. It isn’t always a bad strategy, but users that adhere to this method of password creation tend to make the password something simple, making it ineffective against cutting-edge software designed to crack passwords. 

  • Length Requirements: For years, accounts made it mandatory to have a certain amount of characters in your password. This practice is falling by the wayside because the longer a password is, the simpler users make it so that they can remember it. According to the National Institute for Standards and Technology (NIST), this strategy is actually hurting your ability to keep your accounts secure.

  • Banning Cut and Paste: Some password fields ban users from using the paste feature to enter a password. This all but eliminated the effectiveness of the password manager, an extremely useful tool for many people who couldn’t possibly remember all the account credentials they need daily. 

  • Password Hints: Most of the accounts you set up, especially for your finances, have this option. They provide you with a set of predefined questions to ask if you, for some reason, lose your password. With so much of our information shared online, the practice isn’t as effective as it once was, when less of our personal information was available online.

  • Frequent Password Changes: This directive, usually implemented by overzealous IT administrators, can have the opposite effect due to the fact that many users will forget their new password, or they will create an insecure password so that they CAN remember it. Obviously, a password reset is useful, but doing it frequently doesn’t help secure accounts at all.

Password Hygiene Best Practices

At FRS Pros, we recommend that users use a passphrase made up of at least three words that don’t have anything to do with one another. We also believe that using replacement characters can have value in this method. For example, a passphrase of “asamericanasapplepie” is not in itself secure, because it’s a common phrase, but a passphrase of “asamericanaspanakopita” is better. Sprinkle in upper and lowercase letters, numbers, and symbols like “A$@m371c@n@$5p@n@k0p1t@” and your passphrase is something you can both remember and works well to secure your account.

If you would like more information about password hygiene or securing your accounts and identity online, call the IT professionals at FRS Pros today at 561-795-2000.

How Your Business Could Take Advantage of Cloud Se...
What Reopening Should Look Like to Businesses

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Hackers User Tips Software Cloud Microsoft Efficiency Google Innovation Hardware Data Business Management Hosted Solutions Computer Communication Email Windows 10 Tech Term Smartphones Malware Cybersecurity IT Support IT Services Business Mobile Devices Small Business Data Backup Workplace Tips Android Backup Disaster Recovery Outsourced IT Browser Office 365 Data Recovery Smartphone Upgrade Collaboration Internet of Things Gadgets Windows VoIP Phishing Users Communications Cloud Computing Apps Cybercrime Business Continuity Ransomware Information Data Security Automation Managed IT Services Saving Money Network Passwords Managed Service Miscellaneous Mobile Device Management Microsoft Office Facebook Operating System OneNote Wireless Server Money Artificial Intelligence Alert Covid-19 Blockchain Law Enforcement Two-factor Authentication Social Media Vulnerability Health Employer-Employee Relationship Quick Tips Mobile Device Chrome IT Support Best Practice Managed IT Managed IT Services Information Technology Spam Mobile Office Holiday Virtualization Networking Applications Google Drive Settings Conferencing Windows 7 Word Telephone Systems Patch Management Tech Support Project Management Managed Service Provider Password Data Breach Bandwidth Unsupported Software Augmented Reality BYOD Access Control Hacking App Printing Windows 10 Gmail Save Money Bring Your Own Device Computers Retail Router Data Storage Data Loss Hosted Solution Data Management Search Wi-Fi Avoiding Downtime Mobility Business Technology Productivity Audit Update Data Protection Wireless Charging Politics Meetings Google Docs Shortcut Software as a Service Sports Hard Drive Display Devices BDR Human Resources Telephony Going Green Social IT Management Cost Management Government Payment Cards Marketing WannaCry Travel Commerce Robot Paperless Office Excel Management File Sharing Application The Internet of Things Fraud Encryption VPN iPhone Mobile Security Safety Vendor Proactive IT HIPAA Evernote SaaS Battery Google Assistant User Error History Risk Management Budget Hybrid Cloud Touchscreen Voice over Internet Protocol Wireless Technology WiFi Remote Workers Cortana Windows 10s HBO Smart Devices Charger Entertainment Value Wasting Time Administrator Benchmarks Policy Ciminal Keyboard Medical IT Data Theft Identity Theft Data Privacy Streaming Media Computer Care Nanotechnology Micrsosoft Audits Device Security Amazon Lithium-ion battery Downtime Screen Mirroring Holidays Office Investment Net Neutrality Adobe Workers Laptop Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Legislation Transportation Language Solid State Drive Sabotage Troubleshooting Accessory Access Myths Procedure Private Cloud 5G Copiers Gifts Computing Vendor Management Chromecast Root Cause Analysis Business Intelligence Solutions Windows Ink Virtual Assistant E-Commerce Emails Cast Scam Testing Computer Fan ROI Internet Service Provider Licensing Updates Touchpad Memory Upgrades Managed Services Provider Comparison YouTube Hard Disk Drive PC CRM Outlook Computer Forensics Peripheral Internet Exlporer Threats Video Conferencing Microsoft Excel IT budget Education Inventory Credit Cards App store Samsung Chromebook Co-Managed Services Digital Signage Printer Google Maps Spyware Alexa for Business Virus Camera Windows Server 2008 R2 Microsoft Word Humor Financial Payroll Uninterrupted Power Supply Facebook Privacy Specifications Employees IT Solutions AI Legal Scams Organization Antivirus Telephone Firewall PCI DSS Apple Personal Information Employee Webinar Sales Proactive Projects Training Workstation Tablets Maintenance Security Cameras Consultant eCommerce OneDrive Files Smartwatch Sync PowerPoint Admin DDoS Remote Monitoring Virtual Private Network Storage Social Engineering Reputation Hosted Desktop FAQ Data storage Hyperlink Recovery Processor Regulations Compliance Edge Instant Messaging Hacker Compliance Break/Fix Disaster IT solutions Remote Computing Websites Identity Printers Development Telework NFL eWaste Emergency Machine Learning Fiber Optics Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Wireless Internet Saving Time Identities Point of Sale Regulation Black Market Cleaning Automobile Office tips Big Data Thank You Advertising Twitter Managing Stress USB Worker How To Books Congratulations Video Games Experience Hiring/Firing End of Support Work/Life Balance HaaS Virtual Reality Relocation Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records es Phone System Cache Benefits Communitications Save Time Computer Accessories Monitors PDF Flexibility Music Smart Technology Television CrashOverride Mobile Computing Company Culture Text Messaging Scalability Analytics