Contact
Let's Talk
The Foolproof Formula To Building A Secure Password

The Foolproof Formula To Building A Secure Password

Networking  |  Service Businesses  |  Healthcare  |  Nonprofit  |  Manufacturing & Distribution  |  Construction & Real Estate

It’s World Password Day! Now is the perfect time to take inventory of your passwords and see how well you’re protecting your online data. 

Today’s password standards might look a little different than what you’d expect. Keep reading on to discover password best practices that keep cyber threats at bay. 

What Kind Of Password Should I Be Using? 

Complicated passwords like S3Ad!ther%PsD might sound secure, but we have all struggled to remember a long string of random characters that look like gobbledygook.  

While it’s hard to argue that a password like S3Ad!ther%PsD would get cracked, it's much easier to remember a meaningful phrase like HouseStarkForTheIroneThrone2019. According to LastPass, both options are “very strong” password candidates.  

Get essential tips and tricks to cyber security in our free five-minute  guide...

Years ago, experts recommended that we change our passwords frequently, but now we know that’s not necessarily the case. Instead, the key lies in the complexity of a password. 

Consider this: you own a business and one of your cat-loving employees, Chester, uses “Fluffy12” as his password. Tabitha, who sits in the cubicle next to him, knows how much Chester loves his cat, Fluffy, and that he has a December birthday. See? It wasn’t that hard to guess Chester’s password. Tabitha doesn’t have a mean bone in her body, but if she did, she’d gain easy access to software programs and confidential data that she wasn’t meant to see. 

This potential disastrous scenario can be avoided by requiring employees to create complex passwords from the get-go. This simple best practice will help boost your organization’s cyber security. 

What Happens When A Service I Use Has A Cyber Security Breach? 

If you have an account with a website or service that gets hacked, the first thing you should do is change your password.  When Target was hacked in 2013, millions of end users were affected. One of the first things users were instructed to do was change their target website passwords before a cyber threat hacks in. 

Unfortunately, cyber security breaches happen every day. It's essential to stay alert to the latest threats. If you’re questioning whether a service you use has been hacked, check out Troy Hunt’s Have I Been Pwned? 

How Do I Make My Password Super Secure?  

Here are a few things that can threaten the security of your password: 

  1. Store passwords in a document on your desktop under the name “My Passwords” 
  2. Write your workstation password on a sticky note on your workstation 
  3. Share your password with friends and coworkers 

It can be hard to manage multiple passwords for different websites and applications. Sometimes, we take shortcuts to manage login details, but these can lead to a cyber security breach. Using a password management service is a secure way to house and audit your passwords.  

Applications such as LastPass, DashLane and OnePassword hold passwords in a secure environment, all in one place. They also audit your existing passwords to ensure they’re up to today’s password security standards.  

What Else Can I Do To Stay Cyber Secure?  

It can be impossible to keep up with the latest cyber security protocol and threats. That's why many organizations are turning to managed services to have their cyber security maintenance and training dealt with externally, by pros. Read more about this in our guide, How To Supercharge Your IT Resources With Managed Services 

Need Help?  

If your organization’s cyber security isn’t up to snuff, you could be vulnerable to a cyber attack. Contact our team here or call us at 410.685.5512 to pinpoint where your organization’s cyber security could be improved. 

 Get your free cyber security guide here

About Jeremy Weisinger

Jeremy designs, plans, tests, implements and troubleshoots networks and server systems. Digging deep into technology and understanding how it works and how to configure it is Jeremy’s passion. Jeremy loves to take complex and disparate systems and make the experience as seamless as possible for his clients. Thankfully for the client who rely on him, Jeremy didn’t pursue his childhood dream of becoming a baseball player.