3 Steps to a secure password

IT
Security

_audit

Optimize your IT with a free audit

Start with a free IT audit. We’ll review your costs, cybersecurity, and support to uncover ways to cut expenses, boost security, and drive productivity. Book your audit today!

Book IT Audit
December 30, 2019

3 Steps to a secure password

There's a lot of talk about cybersecurity and all the recent data breaches.' Big headlines but you know what's missing?' Some basic advice for small businesses about how to keep their IT systems secure.In this post, I'm going to tell you the 3 simple steps you should implement today to create a secure password for yourself and something you can share with your colleagues.As an added bonus ' you'll learn the password security method that makes things simple so you are not having to remember multiple passwords or create a new password every other week.

Step 1:

Think passphrase instead of a password.' A passphrase is a series of words instead of a traditional password.Here's an example of a passphrase 'BuddyStaringSheepMoon'This is much easier to remember than something like '$@d32vpa' and guess what it's more secure.The reason for this is due to the length of the password.A lot of hackers out there use brute force methods of attacking.In this method, they run software to guess the password however the longer the password, the more time it takes to imagine.' Having a passphrase with multiple words combined takes years to crack instead of a few hours.

Step 2:

You've probably been told to change your password on a regular basis.' This is often preached as good practice but research has shown that this is not the case.The reason for this is due to users just changing part of the password when asked on a regular basis that they must change it.' This often turns out to be changing the last few characters or incrementing a number at the end.' I was guilty myself of this method until the logic was explained to me.The other reason frequent password changes should be avoided is you tend to forget new passwords sooner and that leads to users writing down their password on a post-it note or similar.Totally defeating the purpose of what you're trying to achieve!Thus, a best practice is to ask employees for password change only in case of potential threat or compromise.

Step 3:

Create a password blacklist policy.Hackers will sometimes implement what's known as a dictionary attack on your network and cloud services.' In this method of attack the hackers use a list of the most common passwords people use to force their way into your business systems.It's surprisingly easy to do and a very common security weakness.It's good practice to show this list of common passwords to your colleagues, inform them of easy to guess passwords that should not be used.Depending on the IT system your business is using you can also enforce the blacklist of passwords that can be created on the actual system itself.' This is, however, the last resort and best to use the person method as employees can also implement the rule on their personal accounts and email also.If you would like to find out more about password security, please get in touch with us.

_news

Related Blogs

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

News
Virtual Desktop
Outsourcing
Software
Security
Office 365
Science
Jobs
IT
Computer
General
Future
Business
Blog
Backup

Book a free consultation

Discover more Topics

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

_services

Managed IT Services

Think of us as your tech partner who’s always got your back. Our Managed IT Services keep things running smoothly, prevent problems before they happen, and make sure your tech is working to help your business grow.

Learn more

Security

Cyber threats keeping you up at night? We get it. Our security services are designed to protect your data and keep you safe, so you can focus on growing your business without the constant worry.

Learn more

Hosted Solutions

Need flexibility to scale? Our Hosted Solutions make it easy. From cloud desktops to data management, we help you streamline, save on costs, and stay productive—without missing a beat as you grow.

Learn more

Voice, Data & Hardware

Communication should be easy, right? With our Voice, Data, and Hardware solutions, we make sure your team stays connected and productive. Whether it’s phones, internet, or cables, we’ll set you up for success.

Learn more