Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

The method in question suggests that passwords chosen by your average PC user aren’t nearly as secure as they should be, but are very easy to remember. As explained in an essay from the university of Southern California, written by Marjan Ghazvininejad and Kevin Knight, it’s best to use randomly generated 60-bit strings (basically, a series of 60 ones and zeros), and convert these strings into words or phrases.

Confused? Let us explain a little more in detail. This method is derived from a XKCD comic (which you can find here) that describes the difficulty of remembering passwords. Basically, what it entails is taking a string of numbers, like 10101101010100101101010101010101010110101101, and converting segments of this code into words to create an English phrase. The above string would wind up reading “correct horse battery staple,” which is complete and utter nonsense, but very easy to remember by associating it with a mental image or a story.

Rather than use a 44-bit string like the above example, Ghazvininejad and Knight suggest using a 60-bit string to increase security, and to create a poem-like string of words that makes sense and is easy to remember. Going too in-depth into this method would take a considerable amount of time to explain, but the basic idea is to create something that’s easy to remember while making it borderline impossible for a computer to guess. By today’s standards, the 44-bit string would take around an hour to crack, while a 60-bit string would take well over a decade. How’s that for secure?

While using segments from existing poems is a possibility, Knight and Ghazvininejad don’t suggest doing so. Considering how there are millions of poems online, the chances of getting hacked are much higher than if the string of characters were truly random. However, while using a line from your favorite poem isn’t as secure as a string of 60 characters, it’s certainly more secure than using a simple password like “MOM385” or “password.” On one hand, you’re using real words that can be used in a dictionary attack; but on the other, you’re using a long password (which is a best practice). So, it’s really up to you to decide how you want to approach password security.

Of course, you’ll need multiple passwords for all of your different accounts. This in itself can make memorizing passwords a huge pain. Therefore, the best way that you can remember all of your passwords and effectively use them to maximize your account security, is by taking advantage of a password manager. Total Tech Care can help your business get set up with the best password manager on the market. To learn more, give us a call at 866-348-2602.

 

Comments 1

Kara AGarcia on Tuesday, 24 July 2018 08:09
What [url=https://www.uk.com/]a review[/url] https://www.uk.com/how-do-you-do.html
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Data Recovery Server Save Money Passwords Windows 10 Saving Money Holiday Chrome Social Media Tech Term Gadgets Virtualization Managed Service Automation Microsoft Office Managed IT Services Operating System Facebook Cybercrime Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Health Wi-Fi Remote Spam Office 365 Telephone Systems Covid-19 Information Managed Service Provider Information Technology Alert Bandwidth Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Password Money Application Remote Monitoring Encryption Applications App History Big Data Law Enforcement Data Breach Human Resources Mobile Computing Remote Computing Apps How To Mobile Office Blockchain Data Storage Paperless Office Patch Management Office Tips Government Training VPN Private Cloud Managed IT IT solutions Work/Life Balance Entertainment Website Budget Mouse HaaS Google Drive Vulnerability Windows 7 Word Wireless Avoiding Downtime Infrastructure Voice over Internet Protocol Servers Gmail Settings Flexibility Marketing Data Security Bring Your Own Device WiFi Two-factor Authentication Data Management Apple Cleaning Social USB User Error End of Support Education Physical Security Meetings Safety Vendor Sports HIPAA Managed Services Software as a Service Redundancy Conferencing Display Telephone System Staff Risk Management Machine Learning Hacker Keyboard Scam Connectivity Remote Work Employee/Employer Relationship The Internet of Things Lithium-ion battery RMM Vendor Management Save Time Firewall Data Protection Virtual Reality Samsung Printer Computing Infrastructure Procurement Going Green Bluetooth Comparison Workplace Strategy Net Neutrality Network Congestion eWaste Value Help Desk CES Battery Printing Spam Blocking Electronic Medical Records Shadow IT Legal IT Consultant Business Technology Content Management Access Control Hiring/Firing Managed Services Provider Wearable Technology Internet Exlporer Virtual Assistant Retail Humor Hard Drives Authentication Instant Messaging Database Robot Excel PDF Remote Workers Biometrics Business Intelligence Processor Proactive IT Virtual Desktop Update Worker Audit Best Practice IT Management Hard Drive DDoS YouTube Google Docs Black Market Identity Theft Botnet SharePoint IT Plan Computing Virus Document Management Unsupported Software Wireless Technology Customer Service Solid State Drive Unified Threat Management How to Downtime Augmented Reality Environment Charger Computer Accessories Fraud Fax Server Data storage Digital Signage Remote Worker Compliance Computer Care Automobile OneNote SaaS Current Events Cryptocurrency Telephony Cache Amazon Web Services AI Root Cause Analysis IT Infrastructure HBO IaaS Knowledge Bing Safe Mode Maintenance Music Criminal FinTech Bloatware Skype Social Network Reputation GDPR Streaming Media Hosted Computing Tech Support Wireless Internet Printer Server Online Shopping Content Data loss Investment Employees Techology Outlook Employee/Employer Relationships Laptop Leadership File Sharing Troubleshooting Tablets Inventory Entrepreneur Specifications Windows 365 Start Menu Customers ISP Camera ROI Loyalty Wire Evernote Audiobook Video Conferencing Screen Mirroring Travel Sales Frequently Asked Questions Bitcoin Touchpad Shortcuts Shortcut Books Cost Management Millennials Point of Sale Mobile Personal Windows 10s Cryptomining Printers Smart Office Social Networking Wireless Charging Politics Supply Chain Management Advertising Cast Monitoring Tip of the week Batteries webinar Emergency Workforce Windows 8.1 Professional Services Digitize Public Cloud Virtual Private Network Notifications Employer Employee Relationship Windows Server 2008 R2 Running Cable Assessment Cables Customer relationships Windows Server 2008 Memory Nanotechnology Telecommuting Email Best Practices Tools IT Assessment Relocation Manufacturing Project Management Consultant Television Analytics Cortana Computer Tips Video Games Managed IT Service Security Cameras Digital Signature Virtual CIO Worker Commute OneDrive Biometric Security Warranty Best Available WIndows 7 Public Computer HVAC Google Apps Science Experience Peripheral Digital Security Cameras Scalability Regulations Using Data Transportation Analysis Rootkit Devices Business Owner Copiers Computer Fan 5G Administrator Distributed Denial of Service NarrowBand Enterprise Content Management Customer Relationship Management Quick Tip Ergonomics Search Workers Smartwatch MSP Benefits Accountants Analyitcs Thought Leadership Programming Credit Cards Development iPhone FENG OLED Microchip Virtual Machine User IBM Password Management PowerPoint Password Manager Windows Media Player PCI DSS Multi-Factor Security 2FA Flash Fiber Optics Employee Smart Technology Twitter Messaging Files Cabling Search Engine Antivirus Software Tips Hypervisor Chromecast Managing Stress Supercomputer NIST Business Mangement Windows 8 Policy Trending Dark mode Sync Trend Micro Emails IT service Smart Tech Uninterrupted Power Supply Addiction Cameras Amazon SMS Colocation Default App Saving Time Recycling Tablet Procedure dark theme Shopping Monitor Netflix Google Search Wiring Domains Two Factor Authentication Practices

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code