Out of the Box Solutions Blog

Password Security Needs to Be a Priority

Password Security Needs to Be a Priority

Passwords are everywhere. It seems that every account requires a password, in addition to the devices we use to access these accounts. This is a good thing, as it only helps to increase security - assuming that the password is strong. After all, a password that anyone can guess can hardly be called a password at all.

Unfortunately, recent insights are showing that passwords are not being approached with security in mind.

An examination of passwords that were leaked in 2017, put together by SplashData, showed that the most common passwords in the sample were “123456” and “password.” Not coincidentally, these were also the passwords that were cracked most often for the fourth year in a row. The most recent edition of the University of Phoenix’s annual cybersecurity survey added to this data. This survey’s results showed that password practices are severely lacking:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

These stats are only made worse when other results from this survey are taken into account. Not only have 43 percent of adults experienced a data breach during the last three years, only 29 percent of workplaces include password protections in their official cybersecurity policies.

Clearly, this isn’t an ideal situation. One of the big contributing problems is the fact that many people simply aren’t confident in their ability to remember the recommended random assortment of alphanumeric characters for one account, let alone for each of the numerous accounts that they have.

Fortunately, there are a few tricks and solutions to help meet these standards.

Let’s be honest, something like “kD78Bnd45” isn’t very easy to remember, and as we’ve discussed, it would be even harder to remember a password like this for each account. It also doesn’t help that many passwords also come with length requirements, meaning that the random code becomes even longer and is therefore more difficult to remember.

While using a single word isn’t advisable, as a little social engineering will generally put the cybercriminal on the right track, your security can be boosted by instead using a sentence. This sentence is known as a passphrase.

For example, ‘starwars’ was the 16th most used password in the Splashdata examination discussed above. If someone were to have a social media account filled with Yoda memes and albums from their time at Orlando, Florida’s Star Wars convention, a cybercriminal would probably guess that this person is one of those who uses ‘starwars’ to protect their data. However, if this password was lengthened into a passphrase, like “I really like Star Wars,” it becomes considerably less obvious.

A password or passphrase can also be strengthened further by also substituting numbers and symbols in for certain letters. Using our example, “I really like Star Wars,” the likelihood of the passphrase being cracked is diminished even more when it is becomes “1 really l!ke St@r W@rs.”

Using a Password Manager
There are also plenty of programs that are designed with those who have a hard time keeping track of their passwords in mind. Password managers can reduce the number of passwords you have to remember down to one, as the rest are securely saved and able to be populated in the appropriate fields.

Whatever it is you decide to use to assist you in managing your passwords, there are also tools available to help you estimate how effective your passwords will be. For example, one of these tools puts the amount of time it would take for a computer to hack into our “1 really l!ke St@r W@rs” example at 3 octillion years. Compare that to “password,” which would be cracked “instantly.”

For more advice on how to maintain your cybersecurity, keep reading our blog, or reach out to us directly at 800-750-4OBS (4627).

How to Best Prepare for Migrating Your Server’s Da...
Tech Term: What Does ‘NAS’ Mean?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Tech Term Network Security Cybersecurity Privacy Smartphones User Tips Malware Hardware Internet Microsoft Passwords Managed IT services Ransomware Android Cloud Communications Communication Data Business Management Email Employer-Employee Relationship Small Business Collaboration Innovation Business Intelligence Efficiency Google Browser IT Support Network Blockchain Applications Hosted Solutions Backup Wi-Fi Mobile Devices Saving Money Social Media Productivity Cortana Workplace Tips Artificial Intelligence Analytics Cloud Computing Bandwidth Virtual Assistant Cost Management Windows 10 Wireless Charging Gmail Software Data Backup Mobile Device VoIp Marketing Compliance Virtualization IT Services VPN BDR Managed IT Service Users Outsourced IT Data Management Information Computers Patch Management Data recovery Internet of Things Remote Computing Computer Save Money Networking Business Tech Terms Wireless Hackers Automation Paperless Office Phishing Smartphone Maintenance Analysis Battery Content Filtering Facebook Movies Authentication Cables eCommerce Comparison Laptop Technology Tips Apps Error Processors Telephony Ink SaaS User Tip Password Managing Stress Digital Data Breach Data loss Router Managed Service Twitter Authorization Database Voice over Internet Protocol Plug-In Online Shopping Specifications Streaming Media Vulnerability Workers Machine Learning Voice over IP Government PowerPoint GDPR Environment Sales Spam Websites Internet Explorer Gadgets IT Management Inventory Unified Communications Cybercrime Proactive IT Backup and Disaster Recovery Downloads Touchscreen Spyware Millennials G Suite Big Data Sports WannaCry Server Management e-waste Tablet Edge Virus Safety Threat Server Data Protection RAM Tactics Remote Monitoring and Management Settings Conferencing Hard Drives Trends Microsoft Office 365 Business Technology HP disposal Bring Your Own Device Storage HIPAA Miscellaneous Excel Antivirus Printing Reporting Managed IT Services Mobile Security Microsoft Teams Telecommute Microsoft Office Office IT budget SSD A.I. Access Control Document Management Value Hybrid Cloud Amazon Holiday Physical Security Connectivity Dark Web Hard Drive Telecommuting Knowledge Office 365 Staff Dongle Paper Medical IT Lead Generation Tip of the week Network Attached Storage Operating System Company Culture Troubleshooting Quick Tips Disaster Recovery Regulation Alert Printers