ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

i-medIT is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 630-549-6199.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Microsoft Cloud Backup Innovation Email Small Business Smartphones Malware Software Hardware Android Business Cybercrime Efficiency Data Backup Windows Mobile Devices Data Ransomware How To Network Security VoIP Internet User Tips Business Continuity Cybersecurity Cloud Computing Browser Social Engineering Managed IT Services Productivity Mobile Device Management Computers Chrome Business Management Data Breach Spam Operating System Social Media Telephone Systems Smartphone Data Security Internet of Things Vulnerability Computer App Data Recovery Money Communication Law Enforcement Server Automation Outsourced IT Windows 10 Alert Disaster Recovery Safety Collaboration Managed IT Services Bring Your Own Device Gadgets Phishing Upgrade Two-factor Authentication Wi-Fi Public Cloud Bandwidth Hosted Solutions BYOD Apps Office 365 Communications Data Protection Redundancy Avoiding Downtime Downtime Comparison Windows 10 Router Recovery Government Remote Monitoring Quick Tips VPN Business Intelligence BDR Update Saving Money Data Storage Network Internet Exlporer CES Data storage IT Management Save Money Passwords OneNote IT Plan Gmail Unsupported Software Word Artificial Intelligence Physical Security Miscellaneous Private Cloud The Internet of Things Virtualization Google Drive Spam Blocking Credit Cards Windows 7 Monitor Uninterrupted Power Supply Infrastructure Microsoft Office webinar Botnet Facebook Going Green Black Market Staff Windows 10s Multi-Factor Security Computer Care Meetings Fraud Networking Flash Hybrid Cloud NarrowBand Data Management Office Tips Password Manager Conferencing Travel Hiring/Firing Samsung Files Trending Amazon IBM PDF Patch Management Wireless Technology Cleaning HBO Business Mangement Emails Office Value History Sports Digital Signature Solid State Drive Data loss Amazon Web Services Supercomputer Sync Scam Relocation Tech Support Recycling Password Robot Encryption Audit Specifications Screen Mirroring Online Shopping Budget Shadow IT eWaste Laptop User Error Accountants Computer Fan Cast Evernote Telephony Chromecast Criminal Netflix HaaS Touchpad IT Services FENG Millennials Wireless Charging Current Events Skype Reputation Apple Holiday IT Support Workforce Frequently Asked Questions End of Support DDoS Cortana Knowledge Start Menu Customer iPhone Content Management Google Docs Flexibility Telecommuting Excel Outlook Internet exploMicrosoft Google Apps Network Congestion Tools Marketing Hacking Managed Service Provider Blockchain Settings Website Remote Work Tip of the week Humor Advertising YouTube Employer-Employee Relationship Automobile IT Consultant Productivity HIPAA Voice over Internet Protocol Legal Identity Theft Windows Server 2008 Big Data Root Cause Analysis Software Tips Workers Work/Life Balance Managed IT Electronic Medical Records Health Human Resources Keyboard Charger Books Save Time Experience Mobile Device Emergency Music Video Games Battery Employer Employee Relationship Scalability Education Information Technology Content Webinar Computer Accessories Workplace Tips Loyalty Computing Infrastructure Transportation Audiobook IT solutions Techology Bluetooth Instant Messaging SaaS Applications Benefits Entertainment Remote Computing Users Wireless Firewall WiFi IT Support Worker Assessment Wearable Technology Virtual Reality Smart Technology Thank You Rootkit Television USB Worker Commute Two Factor Authentication Congratulations Risk Management Mobility Training Search Public Computer Troubleshooting CrashOverride Politics Vendor Management How to Best Practice