Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One World Technology Inc. is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 800-626-8277.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Best Practices Cloud Technology Network Security Business Computing Managed IT Services Backup Hackers Outsourced IT Software VoIP Malware Microsoft Business Business Continuity Hosted Solutions Google Disaster Recovery Email Windows 10 Mobile Devices Data Backup Data Smartphones IT Support Innovation Efficiency Saving Money Hardware Android Small Business Alert Ransomware Cloud Computing Communications Productivity Computer Browser Cybercrime Office Computers Server Business Management IT Services Data Recovery User Tips Telephone Systems BDR Managed IT Passwords Virtualization Mobility Chrome Law Enforcement Work/Life Balance Cybersecurity How To Private Cloud Social Media Productivity Managed IT Services Smartphone Health Internet Avoiding Downtime Wi-Fi Save Money Flexibility Holiday Internet of Things Hacking Collaboration Office Tips Communication Windows App Quick Tips Remote Monitoring Password Social Engineering Firewall Budget Compliance Artificial Intelligence Recovery HaaS Spam Bring Your Own Device Miscellaneous Proactive IT Data Security Mobile Device Management Two-factor Authentication Information Technology Data Breach Router Money Business Intelligence Phishing Value Facebook Office 365 Gadgets BYOD OneNote Content Filtering Mobile Device IT Management Spam Blocking SaaS Business Owner Big Data Upgrade Two Factor Authentication Training IT Plan Public Cloud Operating System Automation Keyboard Document Management Unsupported Software Electronic Medical Records Save Time Workers Charger Vulnerability Computing Infrastructure Black Market Remote Computing Marketing Hiring/Firing Patch Management Google Drive Government CES Identity Theft Apps Automobile Word Scam Risk Management Workplace Tips Credit Cards Solid State Drive History Battery Data Management End of Support Network Computer Care Data Storage Employer-Employee Relationship Redundancy Bandwidth Applications Microsoft Office Legal Data Protection HIPAA Windows 10 Worker Comparison Managed Service Provider Worker Commute Online Shopping Telephony IBM Relocation Rootkit Business Mangement Update Conferencing Specifications Excel Users Evernote Skype Supercomputer Content Wireless Technology Gmail IT Support Millennials Tip of the week Shadow IT Wireless Charging Root Cause Analysis Start Menu Books Humor Vendor Management Audiobook Recycling Google Docs Hybrid Cloud Workforce Windows 10s Windows Server 2008 Assessment Experience Fiber-Optic Mobile Colocation Current Events Entertainment Video Games eWaste Software Tips Website Telecommuting Windows 7 Television Music Cables Meetings Professional Services Knowledge Emergency PDF Criminal Physical Security Voice over Internet Protocol Remote Work Audit Regulations Public Computer Wearable Technology Unified Communications Data loss Tools hacker Network Congestion Emails Unified Threat Management Scalability Multi-Factor Security Hard Drives Files USB Employer Employee Relationship Theft Screen Mirroring Internet Exlporer Cleaning Content Management HBO Trending Computer Fan Servers Troubleshooting Downtime Computer Accessories Cortana Cast Botnet Leadership Transportation Politics Instant Messaging Blockchain Lifestyle Fraud The Internet of Things Flash User Error Safety Education Bluetooth Google Apps Travel Internet exploMicrosoft Benefits Netflix Apple Samsung Human Resources Mobile Computing Amazon FENG Hosted Solution Infrastructure Smart Technology Wireless Settings Outlook iPhone Search Staff Techology Amazon Web Services Sync Networking Virtual Reality Best Practice Password Manager Data Warehousing Software as a Service Advertising webinar Frequently Asked Questions Loyalty How to CrashOverride WiFi Webinar IT solutions Robot Digital Signature

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *