BNMC Blog

Do You Know What a Strong Password Looks Like?

Do You Know What a Strong Password Looks Like?

For the past twenty years, the password has been the most important security tool that individuals and businesses have to keep outside parties out of their personal and professional information. This may not always be the case, but much of a business’ security is built around the idea that passwords are keeping unwanted entities out. It is important that you and your staff understand what good password hygiene looks like. Today, we’ll outline what it looks like.

What is Password Hygiene?
The practice of securing your accounts with well constructed, unique passwords is called password hygiene. Having good password hygiene means that you will avoid the use of authentication methods that can be easily compromised. Below is a list of unhygienic password creation practices:

  • The use of personal details, like your name or birthday
  • The names of friends, family, or pets
  • The use of commonly used words (like “password” or a favorite sports team)
  • Using simple keyboard combinations (like “12345” or “qwerty”)
  • The us of repeated login credentials (like username: Cornoa2020, password: Corona2020)
  • Using short passwords 

If you are now worried that your passwords are easily guessable, don’t fret. Here, we’re going to outline some strategies you should stop using immediately as they no longer provide the value they once did to keep your accounts secure. 

  • Alphanumeric Switching - This is just a fancy euphemism for turning some of your letters in your password to numbers. If you’ve been making passwords for any length of time, you’ve probably taken part in this practice. The problem is that it is ineffective against the modern hacking software designed to crack passwords.
  • Length Requirements - For much of the past decade, if you needed to make an account password, it had to be a certain number of characters. According to the Nation Institute for Standards and Technology (NIST) longer passwords are actually hurting your chances of keeping an account secure as they are harder to remember. 
  • Banning Cut and Paste - This practice was only done for a few years, but industry leaders now find it to be a pointless security gimmick. It eliminates the availability for users to use a password manager, which is one of the best practices for password-led security in 2020. 
  • Password Hints - If you set up online banking anytime in the past decade you were asked a series of questions that would allow you to gain access to your credentials. This isn’t as effective nowadays as more information about users are available online. 
  • Too Frequent Password Changes - You’ll still want to make users change their password, but having them do it so frequently that they forget their credentials can be a major problem for a business. 

Best Practices of Password Hygiene

We have come to recommend that users create passphrases made up of at least three words that don’t have any correlation. In this method, if you want to use replacement characters (like the aforementioned alphanumeric switching), it has value. For example if you were to make the

 At BNMC, we recommend that users use a passphrase made up of at least three words that don’t have anything to do with one another. We also believe that using replacement characters can have value in this method. For example, a passphrase of “japanlovessushi” is not in itself secure, because it’s a common phrase, but a passphrase of “japanlovesenchiladas” is better. Use substitution methods to add security from there.

If you would like more information about password hygiene or securing your accounts and identity online, call the IT professionals at BNMC today at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 29 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy Email User Tips Cloud Microsoft Network Security Efficiency Hackers Business Hosted Solutions Software Data Computer Malware Workplace Tips Hardware Communication Google IT Services Small Business IT Support Internet Smartphone Cloud Computing Mobile Devices Android Mobile Device Tech Term Managed IT Services Data Recovery Users Backup Phishing Ransomware Innovation Windows Outsourced IT VoIP Smartphones Upgrade Information Saving Money Windows 10 Disaster Recovery Miscellaneous Data Backup Facebook communications Social Media Business Continuity Business Management Office 365 Server Cybersecurity Network Microsoft Office Browser Quick Tips Passwords Productivity Managed IT Services Windows 10 Data Management Internet of Things Word Apps Managed Service Analytics Gadgets Vulnerability Remote Monitoring Gmail COVID-19 App Remote Work Infrastructure Mobile Office Save Money Encryption Collaboration Conferencing Chrome Managed Service Provider Government Artificial Intelligence Money Website Applications Spam Router Information Technology Google Drive Tip of the week Company Culture Virtual Reality Settings Remote Workers Employer-Employee Relationship Networking Access Control VPN Paperless Office BYOD IT Support Operating System Unified Threat Management WiFi Office Tips Robot Big Data Firewall Bandwidth Automation Maintenance Content Filtering Avoiding Downtime Employee-Employer Relationship Antivirus Document Management Education Apple Storage Development Computers Hacker Data storage IT Management Data Security YouTube HIPAA Business Technology BDR Display Risk Management Virtual Private Network Outlook Computing Managed IT Bring Your Own Device How To Tablet Data loss Vendor Management Telephone Systems Social Monitors Compliance Business Intelligence LiFi iOS Laptop Humor Chromebook desktop Hosted Solution Best Practice Administration The Internet of Things Two-factor Authentication Regulations Mouse End of Support Managed Services Managed IT Service Customer Relationship Management Scam Downtime Augmented Reality Going Green MSP Marketing Remote Computing Managing Stress Wireless OneNote Solid State Drive Break Fix Data Breach SaaS Printing Search Windows 7 Wi-Fi IT Password Training Holiday Social Network Virtualization Hard Disk Drive Software as a Service Server Management Retail Alert Mobile Security Touchscreen Running Cable Smart Tech Alt Codes Monitoring Techology Solid State Drives Customer Service Work Shortcuts Smart Technology Mobile Management Work/Life Balance Lenovo Employee-Employer Relationships Health Private Cloud Payment Card Buisness Cooperation Service Level Agreement Statistics Streaming Processor Office Samsung Voice over Internet Protocol Tech Support Logistics Sports Hotspot Internet Exlporer Troubleshooting Downloads Business Analysis PCI DSS Virtual Desktop Budget Mail Merge Blockchain Hybrid Cloud Digital Payment Connectivity Typing VoIP Spying Unified Threat Management National Security IT Technicians Optimization Shortcut Security Cameras Distributed Denial of Service Profiles Firefox Analysis Superfish Students Inventory Meetings Staff Disaster Leominster Current Events Bluetooth Human Error Comparison Memory Social Engineering Modem Digital FinTech Websites Asset Management Language Value Virus Twitter Battery Address Scalability Permissions IoT Cryptocurrency User Error Updates Peripheral Mirgation Recycling Patch Management Utility Computing Google Docs Mixed Reality Shadow IT Uninterrupted Power Supply K-12 Schools IT solutions Device Specifications Reducing Cost Safety Cybercrime Cookies Spyware Migration Consulting Memes File Sharing Computing Infrastructure Professional Services Hacks Heating/Cooling LED Multi-Factor Security Threats Files Computer Care Social Networking IBM Star Wars Bitcoin Time Management PowerPoint Printer Network Congestion Management Chatbots eWaste Google Wallet Laptops Business Growth Gamification Wearable Technology Network upgrade Mobility Black Friday Batteries Identity Theft Nanotechnology Emergency Alerts USB Servers Co-Managed IT Google Calendar Writing RMM Motherboard Corporate Profile Cables Legal Halloween Automobile Fraud Cost Management Windows 8 Network Management Onboarding GDPR Policy G Suite Identity Continuity Unified Communications Drones Dark Web Managed Services Provider Screen Reader Charging Slack Hard Disk Drives Dark Data Update Dell Smart Office Print Toner Cyber Monday Myths Deep Learning Messaging Holidays Licensing Cabling Dongle Mobile Device Management Content Legislation Huawei Banking WannaCry Wires Politics Distribution Scary Stories Google Maps Assessment Digital Signage SharePoint Data Warehouse Procedure Solar Entertainment Microsoft Excel Vendor IT Budget Regulation Recovery Web Server what was your? How To Mobile Computing Reviews GPS Black Market IT Consultant Cameras Law Enforcement Electronic Medical Records Notifications Tracking Physical Security Printers Cleaning Emoji CCTV Upgrades Gadget Webcam Crowdsourcing Personal Information Botnet Error Cortana 3D Printing Point of Sale Ben McDonald shares Machine Learning Travel Financial Processors Unsupported Software Supercomputer CrashOverride Computer Repair Relocation Motion Sickness Staffing Mobile Data Administrator Taxes

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3