Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Passwords Aren’t Inherently Secure

Your Passwords Aren’t Inherently Secure

Passwords are just one part of a comprehensive security strategy, but they are a crucial one. You must make sure that you are investing adequate time and effort into making sure your passwords are secure. This is easier said than done, but by the end of this brief article, you’ll have the essential information you need to craft excellent passwords for your accounts.

What Are Some Password Best Practices?

In a list format, we have put together some password best practices for your review:

  • Use complex strings of characters: Your passwords should consist of both upper and lower-case letters, numbers, and special characters.
  • The longer, the better: If you have more characters in your password, there are more opportunities for a hacker to get it wrong. Your passwords should be easy to remember, but hard to guess.
  • Opt for passphrases rather than passwords: To make your passwords easier to remember, you can use a passphrase. The passphrase is basically an upgraded password variant that is harder to guess, but easier to remember. For example, if you were to use a favorite 80’s movie, you might pull a famous line from the movie along with the title and tie it together. For example, if your favorite movie of all time is Short Circuit, you might make your passphrase Sh0rtCIRCUIT#5isALIVE!86
  • Use different passwords for each account: You should be using different passwords for each of your accounts, just in case one of them gets stolen. After all, if you use the same password for every account, you’ll have to change every single one of them anyway.

With these practices, you can make more complex and secure passwords. In addition to these practices, you can consider some of the following to make using them easier and more efficient.

What Else Can You Do to Protect Your Online Accounts?

To capitalize on the benefits of password security for your business, we recommend that you take things just a hair further with additional policies and technology solutions. We recommend multi-factor authentication and password management solutions to get the most out of your password and authentication policies.

With multi-factor authentication, you can use additional authentication protocols alongside passwords to maximize security. Your average multi-factor authentication tool will utilize two of the three methods: something you are (biometrics), something you have (smartphone, USB key), or something you know (a password, PIN, or passphrase).

In comparison, password management tools take what you have applied to your password security and make them that much easier to manage. Password managers store your passwords in an encrypted database where they are protected by a master password. You can then call the passwords as they are needed when you access your accounts. Password managers often have the capability to generate passwords for you, just in case you need some help with your complex passwords. It makes using complex passwords and passphrases that much easier.

Attend IT Limited is here to help outfit your business with the security and productivity tools it needs. Give us a call at 020 8626 4485 to learn more.

The Wide Scope of Cloud Offerings Gives Businesses...
Know Thy Enemy: Warning Signs of Phishing
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Business Computing Network Security Productivity Best Practices Cloud Tip of the Week Managed IT Services Hackers Data Backup Business IT Services Disaster Recovery communications Data Recovery Data IT Support Privacy Hosted Solutions VoIP Software Innovation Backup Mobile Devices Malware Cybersecurity Small Business Efficiency Business Continuity Saving Money Computer Hardware Internet Phishing Outsourced IT Email Cloud Computing Business Management Collaboration Microsoft Automation BDR Productivity Internet of Things Smartphones IT Support User Tips Information Technology Ransomware Upgrade Server Workplace Strategy Smartphone Network Risk Management Budget Covid-19 Managed IT services Mobility Compliance Managed IT Communication Workplace Tips Meetings Quick Tips Users Artificial Intelligence Mobile Device Management Remote Training Save Money Mobile Device Managed Service Provider BYOD Google Avoiding Downtime Remote Workers Wi-Fi Spam Passwords Networking Gadgets Windows 7 Android Document Management Human Resources Instant Messaging Microsoft Office Remote Computing Content Filtering Time Management MSP Wireless Chrome Router Data Management Managed Service Windows 10 Remote Work Information History Computers Employee-Employer Relationship Password Cost Management VPN Virtual Private Network Printing Hosted Solution Firewall Project Management Software as a Service Conferencing Wireless Internet Computing Personal Information Social Media Value Help Desk Government Data Breach Saving Time Encryption Maintenance Telephone Systems Data Security Monitoring IT Service Audit Printer Redundancy Telephony Tech Term Hacker Office Machine Learning Printers End of Support Mobile Big Data Hybrid Cloud Automobile Voice over Internet Protocol Hard Drives Marketing Recovery Paperless Office Manufacturing Laptop Business Technology Devices Mobile Office Solid State Drive Backup and Disaster Recovery Video Conferencing Employer-Employee Relationship Managed Services Application Spyware Development File Storage Windows 11 Entertainment Samsung Break/Fix Window 10 Amazon Outsource IT Commerce Office 365 IoT Downtime Administration Outsourcing Proactive IT Private Cloud Disaster Upgrades Going Green Save Time File Sharing Smart Technology Windows Server Content Filter Wireless Technology Mobile Computing Applications Employees Payroll Battery Apple Two-factor Authentication Bandwidth HIPAA Online Storage Gamification PDF Bitcoin Microsoft Outlook Business Intelligence Analysis Virtual Assistant E-Commerce Telephone Colocation Electronic Medical Records Workstations Customer Service intranet Money Dark Web Virtualization Evernote Copiers User Error Chromebook Cabling Company Culture Customer Relationship Management Finance App Black Market Alexa for Business Browser Payment Cards Remote Working Current Events Word Copier Management Flexibility Inventory Management Shadow IT Voiceover Internet Protocol Managed IT Service Social Engineering Data Loss Smart Tech Vendor iPhone PCI DSS Vulnerability Regulation Students Utility Computing Infrastructure SaaS Hiring/Firing Antivirus Vendor Management Files Windows 10 Cybercrime OneNote Operating System Data Protection Blockchain Financial Technology Facebook Employer/Employee Relationships Nanotechnology Professional Services Workers Business Telephone Azure Connectivity Regulations Compliance e-waste Fiber Optics Unified Communications Videoconferencing Education Cleaning Troubleshooting WPA3 RMM Holiday Proactive Advertising Leadership Wasting Money Work/Life Balance Lifestyle Cybersecurty Cost Update Travel Smartwatch Computer Repair Streaming Transportation Hacking SMB Active Directory Streaming Media Legal Going Paperless The Internet of Things Phone System Windows Server 2008 Remote Monitoring AI Worker Data Privacy CRM Social Audits Windows 10s Outlook Websites Peripheral Virtual Desktop Biometrics How To Settings Server Maintenance Inventory Authentication Legislation Myths Google Assistant Co-Managed Services Humor Augmented Reality Tablets Microsoft Word Computer Tips Cast Camera Search Policy Print Management Computer Fan Music WannaCry Holidays Financial Tech Support Hard Drive Keyboard Solutions Supply Chain Hard Disk Drive Shortcut Google Drive Gifts Data Theft 5G Access Control Business Strategy Best Practice Investment Communitications Internet Service Provider Windows 8.1 Comparison Computer Accessories Language Threats Twitter Innovations How To Remote Management NFL Consultant Storage Security Cameras Processor Projects Procedure Healthcare Alert Licensing Analytics OneDrive Bring Your Own Device Point of Sale Fraud Micrsosoft Relocation Excel Medical IT Memory Admin Apps ROI App store Hosted Desktop Law Enforcement Voice Emails IT Solutions Specifications Scams Computer Forensics Hyperlink Television Telephone System CrashOverride Safety eWaste HBO Robot Identity Theft Sports IT budget Benchmarks Organization Computer Care Sabotage Edge Digital Signage Video Games Environment Politics Credit Cards Charger eCommerce Text Messaging Device Security Windows Server 2008 R2 Mobile Security Smart Devices Reputation Workstation Webinar WIndows Server 2008 Sales Virus Employee Managed Services Provider Gmail Wasting Time Reviews Print Managing Stress Windows Ink Emergency Net Neutrality Work Touchscreen Worker Commute Cortana Scam Unsupported Software Scalability USB Books PC WiFi Data Storage Google Docs Ciminal Health Workplace Strategies iOS Sync Miscellaneous Experience FAQ Keyboard Shortcuts Office Tips Google Maps Identity Telework IT solutions Patch Management Retail Facebook Privacy PowerPoint Accessory 2FA Database HaaS IT Management Identities Display Internet Exlporer SSD Root Cause Analysis Virtual Reality Updates Unified Threat Management Screen Mirroring Microsoft Excel Testing Windows Adobe Wireless Charging YouTube