Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

The method in question suggests that passwords chosen by your average PC user aren’t nearly as secure as they should be, but are very easy to remember. As explained in an essay from the university of Southern California, written by Marjan Ghazvininejad and Kevin Knight, it’s best to use randomly generated 60-bit strings (basically, a series of 60 ones and zeros), and convert these strings into words or phrases.

Confused? Let us explain a little more in detail. This method is derived from a XKCD comic (which you can find here) that describes the difficulty of remembering passwords. Basically, what it entails is taking a string of numbers, like 10101101010100101101010101010101010110101101, and converting segments of this code into words to create an English phrase. The above string would wind up reading “correct horse battery staple,” which is complete and utter nonsense, but very easy to remember by associating it with a mental image or a story.

Rather than use a 44-bit string like the above example, Ghazvininejad and Knight suggest using a 60-bit string to increase security, and to create a poem-like string of words that makes sense and is easy to remember. Going too in-depth into this method would take a considerable amount of time to explain, but the basic idea is to create something that’s easy to remember while making it borderline impossible for a computer to guess. By today’s standards, the 44-bit string would take around an hour to crack, while a 60-bit string would take well over a decade. How’s that for secure?

While using segments from existing poems is a possibility, Knight and Ghazvininejad don’t suggest doing so. Considering how there are millions of poems online, the chances of getting hacked are much higher than if the string of characters were truly random. However, while using a line from your favorite poem isn’t as secure as a string of 60 characters, it’s certainly more secure than using a simple password like “MOM385” or “password.” On one hand, you’re using real words that can be used in a dictionary attack; but on the other, you’re using a long password (which is a best practice). So, it’s really up to you to decide how you want to approach password security.

Of course, you’ll need multiple passwords for all of your different accounts. This in itself can make memorizing passwords a huge pain. Therefore, the best way that you can remember all of your passwords and effectively use them to maximize your account security, is by taking advantage of a password manager. Total Tech Care can help your business get set up with the best password manager on the market. To learn more, give us a call at 866-348-2602.

 

Comments 1

Kara AGarcia on Tuesday, 24 July 2018 08:09
What [url=https://www.uk.com/]a review[/url] https://www.uk.com/how-do-you-do.html
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Chrome Tech Term Virtualization Saving Money Holiday Social Media Gadgets Microsoft Office Managed Service Managed IT Services Automation Operating System Artificial Intelligence Cybercrime Computers Facebook Hacking Health Wi-Fi BYOD Mobile Device Management Networking Internet of Things IT Support Information Remote Spam Covid-19 Office 365 Telephone Systems Information Technology Managed Service Provider Alert Recovery Employer-Employee Relationship Social Engineering Mobility Router Bandwidth BDR Big Data Human Resources Password Money Remote Monitoring Encryption Mobile Computing Applications Data Breach Application App History Law Enforcement Managed IT Remote Computing Apps Data Storage Patch Management Mobile Office Government Office Tips Training Blockchain Private Cloud Paperless Office VPN How To Bring Your Own Device Data Management Two-factor Authentication Work/Life Balance Infrastructure Voice over Internet Protocol Flexibility Mouse HaaS Marketing Vulnerability Windows 7 WiFi Word IT solutions Entertainment Google Drive Website Budget Servers Avoiding Downtime Wireless Data Security Gmail Settings Remote Work Firewall Connectivity Cleaning Virtual Reality Apple Vendor Social Conferencing Managed Services End of Support Display User Error Education Physical Security Scam Safety Meetings Data Protection Sports HIPAA Redundancy Employee/Employer Relationship USB Vendor Management RMM Keyboard Risk Management Hacker The Internet of Things Lithium-ion battery Telephone System Staff Software as a Service Save Time Machine Learning Workplace Strategy Data storage Update Net Neutrality Electronic Medical Records Fax Server Automobile Spam Blocking Help Desk Printing Google Docs Hiring/Firing Identity Theft SaaS Computing Infrastructure Going Green Virus Managed Services Provider Unified Threat Management Network Congestion Computer Accessories Database eWaste Battery Augmented Reality Shadow IT Fraud Legal Business Intelligence Remote Workers Remote Worker Internet Exlporer Worker Processor Audit IT Management Cryptocurrency Printer Wearable Technology Bluetooth Hard Drive Retail Botnet Hard Drives PDF Instant Messaging IT Plan Robot Excel Comparison Proactive IT Biometrics Unsupported Software CES Computing Virtual Desktop Best Practice IT Consultant YouTube Charger Business Technology Black Market Content Management DDoS Humor Access Control Compliance OneNote Computer Care Virtual Assistant Current Events Digital Signage SharePoint Document Management Telephony Authentication Wireless Technology Samsung Solid State Drive How to Downtime Customer Service Value Procurement Environment Outlook Leadership Digital Signature Social Network Troubleshooting WIndows 7 Antivirus Uninterrupted Power Supply Investment Start Menu Warranty Windows 8 Colocation Screen Mirroring HVAC Employees Loyalty Google Apps Employee/Employer Relationships IT service Frequently Asked Questions Windows 365 Monitor Analysis Books ISP ROI Mobile Administrator Tablet Windows 10s Devices Video Conferencing Cast Enterprise Content Management Sales Bitcoin Shortcuts Domains PowerPoint Windows Media Player Tip of the week MSP Point of Sale Reputation webinar Accountants Personal Streaming Media Emergency User Cryptomining Supply Chain Management Tech Support Employer Employee Relationship Credit Cards IaaS Maintenance Content Professional Services Microchip Public Cloud Thought Leadership Bloatware Techology Password Management Monitoring Laptop Assessment Password Manager Batteries Windows Server 2008 Windows 8.1 Customers Digitize Multi-Factor Security Managing Stress Windows Server 2008 R2 Audiobook Tools Search Engine Tablets Twitter Entrepreneur NIST Customer relationships Touchpad Television Business Mangement Cameras Manufacturing Email Best Practices Smart Tech IT Assessment Trending Amazon Shortcut Politics Advertising Addiction Cost Management Computer Tips Public Computer Recycling Managed IT Service Security Cameras Biometric Security Social Networking Regulations Wiring Virtual CIO Practices OneDrive Notifications Transportation Peripheral Rootkit Amazon Web Services Computer Fan Cache Safe Mode Digital Security Cameras Criminal Using Data Printer Server 5G Running Cable GDPR Relocation Workers Hosted Computing Copiers Benefits Quick Tip Online Shopping Memory FENG Wireless Internet Video Games File Sharing Ergonomics IBM Smartwatch OLED Worker Commute Flash Camera Inventory Development Smart Technology Specifications PCI DSS Evernote Virtual Machine Experience Wire Scalability Software Tips 2FA Supercomputer Fiber Optics Travel Employee Cabling Business Owner Sync Printers Science Emails Messaging Millennials Smart Office Policy NarrowBand Wireless Charging Hypervisor Search Dark mode Trend Micro Two Factor Authentication Workforce Default App Distributed Denial of Service Customer Relationship Management Virtual Private Network iPhone Netflix SMS Root Cause Analysis Procedure Cables Saving Time Consultant Analyitcs Analytics Programming HBO dark theme Knowledge Shopping Music Google Search Telecommuting IT Infrastructure Skype Project Management Files Nanotechnology AI Data loss FinTech Chromecast Cortana Best Available Bing

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code