Out of the Box Solutions Blog

Password Security Needs to Be a Priority

Password Security Needs to Be a Priority

Passwords are everywhere. It seems that every account requires a password, in addition to the devices we use to access these accounts. This is a good thing, as it only helps to increase security - assuming that the password is strong. After all, a password that anyone can guess can hardly be called a password at all.

Unfortunately, recent insights are showing that passwords are not being approached with security in mind.

An examination of passwords that were leaked in 2017, put together by SplashData, showed that the most common passwords in the sample were “123456” and “password.” Not coincidentally, these were also the passwords that were cracked most often for the fourth year in a row. The most recent edition of the University of Phoenix’s annual cybersecurity survey added to this data. This survey’s results showed that password practices are severely lacking:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

These stats are only made worse when other results from this survey are taken into account. Not only have 43 percent of adults experienced a data breach during the last three years, only 29 percent of workplaces include password protections in their official cybersecurity policies.

Clearly, this isn’t an ideal situation. One of the big contributing problems is the fact that many people simply aren’t confident in their ability to remember the recommended random assortment of alphanumeric characters for one account, let alone for each of the numerous accounts that they have.

Fortunately, there are a few tricks and solutions to help meet these standards.

Passphrases
Let’s be honest, something like “kD78Bnd45” isn’t very easy to remember, and as we’ve discussed, it would be even harder to remember a password like this for each account. It also doesn’t help that many passwords also come with length requirements, meaning that the random code becomes even longer and is therefore more difficult to remember.

While using a single word isn’t advisable, as a little social engineering will generally put the cybercriminal on the right track, your security can be boosted by instead using a sentence. This sentence is known as a passphrase.

For example, ‘starwars’ was the 16th most used password in the Splashdata examination discussed above. If someone were to have a social media account filled with Yoda memes and albums from their time at Orlando, Florida’s Star Wars convention, a cybercriminal would probably guess that this person is one of those who uses ‘starwars’ to protect their data. However, if this password was lengthened into a passphrase, like “I really like Star Wars,” it becomes considerably less obvious.

Substitution
A password or passphrase can also be strengthened further by also substituting numbers and symbols in for certain letters. Using our example, “I really like Star Wars,” the likelihood of the passphrase being cracked is diminished even more when it is becomes “1 really l!ke St@r W@rs.”

Using a Password Manager
There are also plenty of programs that are designed with those who have a hard time keeping track of their passwords in mind. Password managers can reduce the number of passwords you have to remember down to one, as the rest are securely saved and able to be populated in the appropriate fields.

Whatever it is you decide to use to assist you in managing your passwords, there are also tools available to help you estimate how effective your passwords will be. For example, one of these tools puts the amount of time it would take for a computer to hack into our “1 really l!ke St@r W@rs” example at 3 octillion years. Compare that to “password,” which would be cracked “instantly.”

For more advice on how to maintain your cybersecurity, keep reading our blog, or reach out to us directly at 800-750-4OBS (4627).

How to Best Prepare for Migrating Your Server’s Da...
Tech Term: What Does ‘NAS’ Mean?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, December 13 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Internet Privacy Cybersecurity Productivity Efficiency Browser Smartphones Microsoft Communication Malware Hardware Android Email IT Support Cloud Backup Saving Money Data recovery Managed IT services Ransomware Passwords Wi-Fi Small Business Windows 10 Data Backup Google IT Services Network Data Communications Business Management Mobile Device Applications Users Information Cloud Computing Internet of Things Social Media Managed IT Services Networking Innovation Hosted Solutions Business Intelligence Blockchain Employer-Employee Relationship Mobile Devices Collaboration VoIp Business Software Workplace Tips Marketing Wireless Outsourced IT Analytics Compliance Virtual Assistant Remote Computing Wireless Charging Patch Management Computer Remote Monitoring and Management Hackers Connectivity Virtualization VPN Cortana Microsoft Office Apps Data Management Bandwidth Computers Cost Management Gmail Save Money Tech Terms Automation Managed Service BDR Managed IT Service Artificial Intelligence Tactics Business Technology Hard Drives Trends Password Conferencing Digital Data loss Proactive IT Help Desk Touchscreen disposal Bring Your Own Device Printing Online Shopping Excel Mobile Security Microsoft Teams Vulnerability Machine Learning Outlook Office SSD A.I. Spam Business Continuity Telecommuting IT Management Microsoft Office 365 Value Hybrid Cloud Tip of the week Dongle Paper Storage Knowledge Office 365 Operating System Company Culture Spyware Profitability Content Filtering Maintenance Big Data Reporting Phishing Facebook Movies WannaCry Server Management Miscellaneous Edge Virus Upgrade Technology Tips Server Access Control Comparison Cables Eliminating Downtime User Tip Ink Settings Dark Web Telephony Managing Stress HP Amazon Router Medical IT Data Breach Twitter HIPAA Antivirus Analysis Certification Workers Streaming Media Authentication Specifications Database Voice over Internet Protocol BYOD Government PowerPoint IT budget Error Voice over IP Environment Document Management Telecommute Gadgets Websites Internet Explorer Holiday Physical Security SaaS Sales Inventory Unified Communications Hard Drive Troubleshooting Staff Millennials Backup and Disaster Recovery Downloads Lead Generation Network Attached Storage Authorization Cybercrime Smartphone Plug-In Wireless Internet Sports Battery e-waste G Suite Paperless Office Safety Threat eCommerce Laptop GDPR Tablet Data Protection RAM Processors Update Quick Tips Alert Regulation Disaster Recovery Printers