Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Tip of the Week: Taking Your Password Practices to the Next Level

Tip of the Week: Taking Your Password Practices to the Next Level

Passwords… can be annoying, if we’re being honest. They are, however, also incredibly important to your business’ overall security strategy. We’ve all heard the suggestions on how to create secure passwords. As it turns out, there is more to modern security then that. Let’s explore a few options to help you create useful passwords, and take a look why passwords are only the beginning. 

Don’t Neglect the Tried and True Rules

While we want a password to be easy to remember, we also don’t want it to be easy to guess. This is why we can’t help but shake our heads at the top-15 results of an analysis of data collected from the security website Have I Been Pwned:

  1. 123456 
  2. 123456789 
  3. qwerty 
  4. password
  5. 1111111 
  6. 12345678 
  7. abc123 
  8. 1234567 
  9.  Password1
  10. 12345 
  11. 1234567890
  12. 1123123 
  13. 000000 
  14. Iloveyou
  15. 1234 

Many of these passwords clearly break some of the cardinal rules of password security, such as ensuring that there is a mix of character types included in the password, making sure that the password is of sufficient length, or using obvious words, like “qwerty” or “password.”

What’s worse, it is probably a safe bet that many of the owners of these passwords had a tendency to recycle them across their accounts, putting more of their accounts at risk. None of this is a good thing for security, of course. 

You definitely should not be using the same password to get into different accounts. This is not a good practice. The reason is pretty easy to explain: If a password were to be compromised for one account, that would mean that multiple accounts would be compromised. 

A Proven Means of Securing Your Accounts

There are several different ideas about how to do this. One means is to use a passphrase - a series of random words, rather than characters, that is both significantly more secure than most passwords and is easier for a user to remember.

However, as is so often the case, you can start to encounter difficulties once the human element is introduced. We, as a species, tend to gravitate towards patterns, so we have difficulties creating a truly random series of words in our own.

To counter this, an IT professional named Arnold Reinhold developed Diceware, a reliable means of generating a passphrase for yourself.

Referencing the Diceware word list, roll five dice (or one die, five times) and find the corresponding word to the values you rolled. Repeat this process until you have a total of six or seven words, and you’ve got your passphrase.

Why the dice? Simple - it makes it much more random, even than a user “randomly” selecting words from the list of potential words to include.

A Demonstration

Let’s say we were to use this method now, and rolled the following number sets:

      • 21633
      • 16521
      • 31336
      • 13263
      • 52452
      • 33535

Referencing the word list, this gives us the following words...

      • Criss
      • Choke
      • Gluing
      • Bambi
      • Rust
      • Ice

...and, as a result, our passphrase.

The webcomic xkcd provides an illustrated explanation of why passphrases are so effective:

However, many users will understandably hesitate to use passphrases, because this means that - assuming they subscribe to best practices - they will have to remember a series of six completely random words for each of their accounts.

This is where password managers prove their worth. Utilizing a password manager to save your passphrases, and securing it with one, allows you to optimally secure your accounts without the need to worry about forgetting all of your access credentials.

For more means of improving your business’ use of technology, subscribe to our blog, or reach out to us directly at 561-795-2000.

Google Knows a Lot About You. Here’s How to Contro...
Some of the Worst Data Breaches Since September

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Privacy Productivity Business Computing Hackers Internet User Tips Google Microsoft Software Cloud Innovation Business Management Hardware Computer Email Tech Term Data Cybersecurity Data Backup Efficiency Windows 10 Communication Hosted Solutions Mobile Devices Smartphones Malware IT Services Office 365 Data Recovery Browser IT Support Outsourced IT Smartphone Upgrade Business Android Backup Internet of Things Windows VoIP Gadgets Data Security Phishing Small Business Workplace Tips Apps Communications Disaster Recovery Cybercrime Business Continuity Saving Money Managed IT Services Users Network Ransomware Facebook Operating System Cloud Computing Information Mobile Device Management Money Artificial Intelligence Automation OneNote Alert Passwords Law Enforcement Social Media Employer-Employee Relationship Managed Service Server Two-factor Authentication Vulnerability Best Practice Holiday Collaboration Managed IT Services Networking Miscellaneous IT Support Managed IT Virtualization Health Applications Blockchain Wireless Spam Chrome Microsoft Office Data Storage Retail Password Mobile Device Information Technology Word Windows 7 Hacking Windows 10 Project Management Gmail Patch Management Save Money Managed Service Provider Computers Data Breach Unsupported Software Augmented Reality BYOD Router Quick Tips Access Control App Google Drive Settings Printing Bring Your Own Device Telephone Systems Tech Support Google Assistant User Error Social Hybrid Cloud Touchscreen Telephony Risk Management Going Green WiFi Cortana Voice over Internet Protocol Government Data Loss Robot Conferencing Wi-Fi Update Business Technology Audit Meetings The Internet of Things Google Docs Shortcut Data Protection Wireless Charging Politics VPN iPhone Devices Hard Drive Display BDR Cost Management Bandwidth IT Management History Budget Payment Cards Travel Commerce WannaCry Wireless Technology File Sharing Application Hosted Solution Data Management Paperless Office Excel Search Fraud Encryption Avoiding Downtime Mobility Productivity Safety Mobile Security SaaS Vendor Proactive IT Sports Evernote Hyperlink Chromecast Processor Edge Instant Messaging Hacker Break/Fix IT solutions Hosted Desktop FAQ Development NFL eWaste Emergency Machine Learning Touchpad Fiber Optics Websites Identity Printers Wireless Internet Saving Time Internet Exlporer Remote Workers Identities Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Value Wasting Time Benchmarks Ciminal Medical IT Windows 10s HBO Smart Devices Charger Entertainment Micrsosoft Device Security Amazon Downtime Screen Mirroring Humor Uninterrupted Power Supply Holidays Data Theft Identity Theft Data Privacy Computer Care Nanotechnology Adobe Workers Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Legislation Language Office Investment Accessory Myths Software as a Service 5G Solid State Drive Personal Information Sabotage Business Intelligence Windows Ink Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Vendor Management Root Cause Analysis Licensing Updates Memory Human Resources Upgrades DDoS Managed Services Provider Comparison Scam Testing Computer Fan Reputation Files ROI Computer Forensics Peripheral Data storage Recovery Threats Microsoft Excel IT budget Education YouTube Hard Disk Drive Disaster PC Outlook Remote Computing Digital Signage Google Maps Spyware Alexa for Business Marketing Inventory Credit Cards App store Samsung Chromebook Co-Managed Services Microsoft Word Financial Payroll Facebook Privacy Specifications Virus Camera Windows Server 2008 R2 Management Administrator Scams Employees IT Solutions Legal Streaming Media Firewall Apple Employee Webinar Lithium-ion battery Antivirus Telephone Mobile Office Tablets Maintenance Security Cameras Consultant Laptop eCommerce Sales Proactive Projects Transportation PowerPoint Admin Remote Monitoring Access Virtual Private Network Storage Social Engineering Battery OneDrive Private Cloud Smartwatch Sync Television CrashOverride Compliance Congratulations Company Culture Scalability Analytics End of Support Keyboard Regulation HaaS Relocation Black Market Cleaning Big Data Automobile Twitter Managing Stress USB Worker How To Books PDF Hiring/Firing Mobile Computing Video Games Experience Virtual Reality Work/Life Balance Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship Cache Benefits es Phone System Save Time Communitications Thank You Office tips Computer Accessories Training Monitors Flexibility Music Advertising Smart Technology