BNMC Blog

Tip of the Week: How to Make Your Credentials More Memorable

Tip of the Week: How to Make Your Credentials More Memorable

Let’s face facts: as critical to your security as they are, passwords are kind of the worst. Of course, since they are so critical, you need to make sure all of the ones you use are as secure as possible, so we’ve assembled some practices that may help you tip the scales in your favor. Spoiler alert: the conventional password may not be your first choice for much longer.

What Not to Do

There’s a tricky balance to strike when devising a password. On the one hand, you want it to be sufficiently secure, but on the other, you don’t want to make it too difficult to get back in for yourself, either.

This is probably the reason that so many password rules and best practices are broken and ignored: user convenience.

Let’s take a look at the top 15 results of some data compiled by the United Kingdom’s National Cyber Security Centre with the help of the security website Have I Been Pwned, regarding the most commonly breached passwords:

  1. 123456 
  2. 123456789 
  3. qwerty 
  4. password
  5. 1111111 
  6. 12345678 
  7. abc123 
  8. 1234567 
  9. Password1
  10. 12345 
  11. 1234567890
  12. 123123 
  13. 000000 
  14. Iloveyou
  15. 1234

Just glancing over this list, you can very easily see how a few of the simplest password quality rules are broken - common words, common number strands, and hardly any mix of alphanumeric characters.

It is probably also a safe bet that a person who would use a password like this would also be the person to repeat their password across accounts. This means that if one of their accounts were breached, they all would be rendered insecure. 

Of course, now that we’ve clearly outlined the problem, we have a proposed strategy to help fix it.

Using a Truly Random Passphrase

One way that you can improve upon password security is known as the passphrase. Instead of using random characters, random words are used, helping to make it both more complicated and easier to remember.

The web comic xkcd does a good job of explaining it:

However, this opens us up to new issues - like the very human instinct to stick to a pattern of some sort. Good for survival, not so great when you’re looking for true randomness.

This is why an IT professional named Arnold Reinhold developed a new method of generating a passphrase, called Diceware.

Taking a die, roll it five times, taking note of the numbers you’ve rolled. Whatever the 5-digit number you produced was, find it on the official Diceware word list. That is now the first word of your passphrase. Repeat this process until you have six or seven words in your passphrase. This helps eliminate human bias from the selection process, making this process about as random as possible.

Demonstrating Diceware in Action

Rolling a die, I came up with 45656. Diceware says that’s “pleat.”

My next roll came up 13211. “Bach.”

34663, making the next word “Julie.”

32135 means the next word is “gulp.”

32565, for a final word “choice” of “Hera.” 

So, my new passphrase is “pleatBachJuliegulpHera.” Gibberish, yet still far more memorable than the alternative system.

Remembering All These Passphrases

So, with the “random” part of our concerns addressed, there is still the concern that remembering so many different passphrases may be a bit much to ask. This is why we recommend that you combine your use of passphrases with the use of a password manager.

These handy programs secure all of your passwords (or passphrases) in a secure vault, ready for you to access with a single, master password (or passphrase). As a result, as long as you can remember one passphrase, you can use the password manager to handle the rest of your accounts.

For help in implementing all of this (or with any other assistance with your business’ information technology) give BNMC a call at 978-482-2020. What other tips would you like us to cover? Let us know in the comments, and subscribe so you don’t miss it!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 31 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Productivity Privacy Cloud User Tips Network Security Microsoft Email Computer Software Hackers Hosted Solutions Malware Google Data Communication Business Mobile Devices Workplace Tips IT Services Efficiency Small Business Tech Term Hardware IT Support Managed IT Services Data Recovery Internet Innovation Ransomware Backup Cloud Computing Smartphone Android Outsourced IT Upgrade Windows Smartphones Data Backup Users Saving Money Mobile Device Miscellaneous Facebook Phishing Information Business Continuity Windows 10 Business Management Server Network Browser Social Media Cybersecurity Office 365 Managed IT Services Microsoft Office Internet of Things Data Management Disaster Recovery Windows 10 Passwords communications Gmail Gadgets Vulnerability Word Remote Monitoring App VoIP Productivity Chrome Artificial Intelligence Quick Tips Apps Encryption Managed Service Infrastructure Settings Managed Service Provider IT Support Save Money Money Access Control VPN Applications Router Virtual Reality Website Employer-Employee Relationship Company Culture Analytics BYOD Tip of the week Display Development Avoiding Downtime Antivirus Remote Workers Hacker Data storage Collaboration Firewall HIPAA Maintenance Robot BDR Networking YouTube Automation Risk Management IT Management Data Security Information Technology Google Drive Office Tips Virtual Private Network Bandwidth Content Filtering Government Paperless Office Computers Education Big Data Apple Storage Employee-Employer Relationship Unified Threat Management Password Telephone Systems Managed IT Service Social Network Marketing OneNote desktop Customer Relationship Management Scam Data Breach Monitors Break Fix Vendor Management Windows 7 Chromebook Search Software as a Service Document Management Outlook Spam Mobile Security Computing WiFi Bring Your Own Device Operating System End of Support Social Wireless LiFi Solid State Drive Humor Business Intelligence Server Management Hosted Solution Business Technology Touchscreen Remote Computing Administration Best Practice Managed IT Mouse Hard Disk Drive iOS SaaS Tablet Laptop The Internet of Things Wi-Fi Virtualization MSP Holiday Augmented Reality Managing Stress Downtime Data loss Two-factor Authentication Retail Alert Printing IT Nanotechnology Patch Management LED Threats Politics Wearable Technology Legal Network upgrade User Error Migration Consulting Customer Service Windows 8 Motherboard Digital Payment Cables PowerPoint Specifications Work/Life Balance Unified Communications Alerts Drones USB Laptops COVID-19 Private Cloud Identity Continuity Digital Heating/Cooling Multi-Factor Security Office Samsung Fraud Cost Management Disaster Mobility Batteries Holidays Mobile Device Management Screen Reader Charging Co-Managed IT Distribution Tech Support Deep Learning Smart Office Time Management Printer Wires Onboarding Black Friday GDPR Halloween Licensing Dongle Managed Services Provider Alt Codes Solar Spyware Servers Slack Google Calendar Hard Disk Drives Social Engineering Assessment Uninterrupted Power Supply Emergency Print Toner Myths Payment Card Messaging File Sharing Smart Tech Content Dark Web Huawei Logistics Websites Computer Care Work IBM Network Management Voice over Internet Protocol Digital Signage Cyber Monday Data Warehouse Scary Stories Cooperation Budget Service Level Agreement Entertainment Vendor Typing Compliance Identity Theft Monitoring Legislation Solid State Drives Safety Running Cable Hotspot Internet Exlporer Shortcuts Mobile Management Inventory Optimization Corporate Profile SharePoint Employee-Employer Relationships Current Events Connectivity Streaming Microsoft Excel Processor Asset Management Buisness IT Technicians Training Network Congestion Virtual Desktop Automobile Modem FinTech Troubleshooting Smart Technology Business Analysis Sports Staff G Suite Leominster Techology Hybrid Cloud Cryptocurrency Regulations Statistics Spying National Security Language Value Dell How To Lenovo Security Cameras Profiles Shadow IT Mirgation Google Docs Recycling WannaCry Analysis Downloads Students Writing IT solutions Going Green IoT Cabling Mail Merge Human Error Blockchain Memory Memes Hacks Cookies Google Maps Shortcut Distributed Denial of Service Virus K-12 Schools VoIP Unified Threat Management Scalability Conferencing Dark Data Update Bitcoin Social Networking Bluetooth Comparison Updates Computing Infrastructure Google Wallet Professional Services Firefox Superfish Managed Services Utility Computing Gamification Business Growth Chatbots eWaste Mixed Reality Cybercrime Star Wars Address Device Permissions Reducing Cost Mobile Data IT Consultant Recovery How To Cameras Health Tracking Meetings Black Market Financial Cleaning Law Enforcement CCTV Remote Work Electronic Medical Records Notifications Webcam Twitter Mobile Computing Regulation Physical Security Emoji Error Upgrades Gadget Crowdsourcing Point of Sale Ben McDonald shares Travel Personal Information Botnet Cortana 3D Printing Supercomputer CrashOverride Staffing Processors Motion Sickness Machine Learning Administrator Printers Unsupported Software Taxes IT Budget Web Server what was your? Relocation GPS Computer Repair

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3