MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

SplashData collected and examined passwords that were leaked in 2017, resulting in the most common passwords being “123456” and “password.” These also happened to be the most cracked passwords for the past four years. The University of Phoenix’s annual cybersecurity survey has also provided some interesting insights:

  • Only 42 percent of Americans use different passwords across different websites.
  • Only 35 percent regularly update their passwords.
  • Only 24 percent update their passwords before they have to travel.

Furthermore, 43 percent of adults have experienced a data breach over the past three years, and 29 percent of workplaces have password protection as an official part of their cybersecurity policies. While these statistics aren’t the best situation, it’s important to understand why this is the case. One of the biggest issues regarding password security is that people don’t have enough confidence in their ability to remember complex passwords. This is augmented by the fact that multiple passwords are needed to ensure all accounts are secure. You can use some tips and tricks to remember them, though.

A random string of letters, numbers, and symbols simply isn’t user-friendly or easy to remember. When you’re restricted by length and content requirements, implementing a password that is easy to remember is borderline impossible. Since you don’t want to use just a single word either, you can boost the security of your password by lengthening it into a passphrase--sort of like a secret phrase that you, and only you, should know.

For example, the phrase “starwars” was one of the most used passwords in the SplashData survey. If information on a user’s social media profile indicates that they are a Star Wars fan, a cybercriminal could use this information to guess the password and cause all sorts of trouble. By lengthening your password into a full sentence, like “I really like star wars,” you can drastically improve security for your account.

If security is a further issue, you can improve the strength of your passwords by replacing numbers and symbols for specific letters. For example, the previous example of “I really like Star Wars” can be changed to “1 really l!ke St@r W@rs.” This makes it more difficult for a hacker to guess the password.

Implement a Password Manager
The security industry is completely aware of how difficult passwords are to remember. This is why password managers have become a major implementation of any security-minded organization. Instead of having to remember multiple complex passwords, a password manager provides a secure vault for storage of any complex passwords, all of which are controlled by a master password.

Does your business need help with cybersecurity? MERIT Solutions has the solution. To learn more, reach out to us at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup google Business Management Managed IT Services Productivity Microsoft Computer Disaster Recovery communications Mobile Devices VoIP Business Continuity Business Outsourced IT IT Support Windows 10 User Tips Hardware IT Services Productivity Innovation Email Cybercrime Small Business Efficiency Windows Managed IT Data Backup Mobility Server Mobile Device Management browser Apps Smartphone Cybersecurity Ransomware Internet of Things Data Recovery Telephone Systems Save Money Operating System Saving Money Passwords Law Enforcement Hosted Solution Quick Tips Android Virtualization Money Information Technology Password Holiday Recovery Phishing Chrome Microsoft Office BYOD Data Security Data BDR VPN Office 365 Government Computers IT Support Update Social Media Best Practice Wireless Gadgets Vulnerability Budget Smartphones Risk Management Data Management Unsupported Software Cloud Computing Social upgrade Work/Life Balance App Hacking Communication Wi-Fi Google Drive Avoiding Downtime Automation Alert Health Miscellaneous Facebook Managed Service Provider Collaboration Personal Information Private Cloud Office tips Applications History Politics Proactive IT Two-factor Authentication Windows 10 USB Workplace Tips Save Time The Internet of Things Spam Social Engineering Identity Theft Managed IT Services Flexibility Data Breach Shortcut search Wireless Technology Firewall Application Telephony Antivirus Current Events Audit User Error Compliance Robot Redundancy Gmail End of Support Automobile Remote Computing Commerce Blockchain Cortana Saving Time Cleaning Patch Management IT solutions Office Disaster Computer Care DDoS Phone System Humor Legal Employer-Employee Relationship Television Users Encryption Excel Network Sports Data Storage Streaming Media Apple Tech Support OneNote Artificial Intelligence Fraud Tech Term Hacker WiFi Internet Exlporer Solid State Drive Cost Management Going Green Bandwidth Data Loss Marketing SaaS eWaste iPhone Project Management Google Docs Samsung Content Filtering Mobile Computing Battery Transportation HaaS Data Protection Professional Services Point of Sale intranet File Sharing Company Culture HIPAA server installation dvd "cannot install required files" Windows 10s stock Black Market Consultant IT Management Travel Smart Technology Nanotechnology Avoid Downtime IT budget Uninterrupted Power Supply Storage Value Laptop Hard Disk Drive tweet Shadow IT Credit Cards WIndows Server 2008 Tablets Root Cause Analysis Document Management Maintenance Experience Touchpad calculator Reputation Twitter FAQ NFL Augmented Reality Advertising control Device Security Video Games Identities Lifestyle Business Intelligence Touchscreen WSJ Virtual Reality Charger Outlook Word Scam Data storage Exchange Devices IoT Legislation Managed IT Service Distributed Denial of Service Music altivista iOS Administration Chromecast Wireless Charging Windows Ink Employer Employee Relationship SBS Spyware compaq Language Comparison Analytics Keyboard Computer Fan Colocation Instant Messaging Evernote Regulation Google Maps Computer Accessories Hard Drives Wearable Technology Worker Commute hp Files Specifications Mobile Device Screen Mirroring Big Data Dark Web Managing Stress Administrator Networking Lithium-ion battery Sync Software as a Service Meetings domain Edge Scalability Virus Sales Cast Books Emails Adobe Hiring/Firing Relocation Education Access Workers Ciminal Vendor Management Settings remote Router Yahoo How To Proactive Retail Licensing Benefits WannaCry Updates PDF Running Cable Server 2008 Webinar Ali Rowghani Websites Conferencing Unified Threat Management HBO Mobile Trending Microsoft Word MSP Microsoft Excel Training Text Messaging Entertainment Electronic Medical Records IT solutions Gifts Upgrades Safety Thank You Emergency Congratulations Worker CrashOverride Cache Monitors Remote Monitoring Data Theft

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...