Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

The method in question suggests that passwords chosen by your average PC user aren’t nearly as secure as they should be, but are very easy to remember. As explained in an essay from the university of Southern California, written by Marjan Ghazvininejad and Kevin Knight, it’s best to use randomly generated 60-bit strings (basically, a series of 60 ones and zeros), and convert these strings into words or phrases.

Confused? Let us explain a little more in detail. This method is derived from a XKCD comic (which you can find here) that describes the difficulty of remembering passwords. Basically, what it entails is taking a string of numbers, like 10101101010100101101010101010101010110101101, and converting segments of this code into words to create an English phrase. The above string would wind up reading “correct horse battery staple,” which is complete and utter nonsense, but very easy to remember by associating it with a mental image or a story.

Rather than use a 44-bit string like the above example, Ghazvininejad and Knight suggest using a 60-bit string to increase security, and to create a poem-like string of words that makes sense and is easy to remember. Going too in-depth into this method would take a considerable amount of time to explain, but the basic idea is to create something that’s easy to remember while making it borderline impossible for a computer to guess. By today’s standards, the 44-bit string would take around an hour to crack, while a 60-bit string would take well over a decade. How’s that for secure?

While using segments from existing poems is a possibility, Knight and Ghazvininejad don’t suggest doing so. Considering how there are millions of poems online, the chances of getting hacked are much higher than if the string of characters were truly random. However, while using a line from your favorite poem isn’t as secure as a string of 60 characters, it’s certainly more secure than using a simple password like “MOM385” or “password.” On one hand, you’re using real words that can be used in a dictionary attack; but on the other, you’re using a long password (which is a best practice). So, it’s really up to you to decide how you want to approach password security.

Of course, you’ll need multiple passwords for all of your different accounts. This in itself can make memorizing passwords a huge pain. Therefore, the best way that you can remember all of your passwords and effectively use them to maximize your account security, is by taking advantage of a password manager. Total Tech Care can help your business get set up with the best password manager on the market. To learn more, give us a call at 866-348-2602.

 

Comments 1

Kara AGarcia on Tuesday, 24 July 2018 08:09
What [url=https://www.uk.com/]a review[/url] https://www.uk.com/how-do-you-do.html
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Phishing Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Saving Money Holiday Social Media Chrome Gadgets Virtualization Tech Term Automation Managed IT Services Microsoft Office Managed Service Cybercrime Operating System Computers Artificial Intelligence Facebook Mobile Device Management Networking IT Support Health Hacking Internet of Things Wi-Fi BYOD Information Technology Remote Managed Service Provider Covid-19 Spam Information Alert Office 365 Telephone Systems Bandwidth Employer-Employee Relationship Recovery Router Social Engineering BDR Mobility Encryption Applications Human Resources Big Data Law Enforcement Remote Monitoring Data Breach Mobile Computing Password App Money History Application VPN How To Government Remote Computing Blockchain Data Storage Patch Management Paperless Office Private Cloud Mobile Office Managed IT Office Tips Apps Training Data Security Gmail Settings Google Drive Two-factor Authentication Avoiding Downtime Mouse HaaS Vulnerability Windows 7 Word Flexibility Marketing Servers Bring Your Own Device WiFi Data Management Infrastructure IT solutions Work/Life Balance Voice over Internet Protocol Entertainment Website Budget Wireless End of Support Lithium-ion battery Education Physical Security Data Protection Safety Sports HIPAA Firewall Redundancy Vendor Keyboard Managed Services Display Virtual Reality Apple Social Conferencing Telephone System Employee/Employer Relationship Staff Software as a Service Scam User Error RMM Machine Learning Meetings Save Time Remote Work Connectivity Vendor Management Cleaning Risk Management Hacker USB The Internet of Things Current Events Workplace Strategy Shadow IT Remote Worker Net Neutrality SharePoint Telephony Legal IT Consultant Cryptocurrency Help Desk Samsung Printing Internet Exlporer Humor Customer Service Environment Value Comparison PDF Fax Server Spam Blocking Electronic Medical Records Managed Services Provider CES Proactive IT Database SaaS Hiring/Firing Remote Workers Best Practice Business Technology Content Management YouTube Access Control Black Market Processor Virtual Assistant Network Congestion eWaste Authentication Hard Drive Virus Business Intelligence Document Management Solid State Drive Wireless Technology Unified Threat Management Audit How to Worker Downtime Computing Computer Accessories IT Management Update Wearable Technology Botnet Retail Hard Drives Data storage IT Plan Automobile Instant Messaging Google Docs Robot Identity Theft Excel Computing Infrastructure Digital Signage Printer Unsupported Software Biometrics Virtual Desktop Going Green Bluetooth Charger Augmented Reality Fraud Compliance DDoS Procurement OneNote Battery Computer Care Trending Social Network Smart Tech Audiobook Addiction Customer Relationship Management Amazon Netflix Two Factor Authentication Touchpad Investment Distributed Denial of Service Employee/Employer Relationships Recycling Root Cause Analysis Analyitcs Employees Knowledge Windows 365 Advertising Music Wiring ISP Practices HBO Politics Programming Cache Skype Amazon Web Services Video Conferencing ROI Bitcoin Notifications Safe Mode Shortcuts Criminal Data loss Sales Leadership Point of Sale Troubleshooting Personal GDPR Cryptomining Antivirus Hosted Computing Outlook Wireless Internet Start Menu Online Shopping Windows 8 Supply Chain Management Batteries File Sharing Consultant IT service Screen Mirroring Loyalty Monitoring Relocation Specifications Windows 8.1 Books Digitize Camera Inventory Analytics Frequently Asked Questions Wire Mobile Evernote Windows 10s Video Games Tablet Windows Server 2008 R2 Best Available Domains Cast Worker Commute Travel Customer relationships Millennials webinar Email Best Practices Emergency IT Assessment Printers WIndows 7 Manufacturing Tip of the week Experience IaaS Smart Office Professional Services Maintenance Wireless Charging Public Cloud Scalability Employer Employee Relationship Managed IT Service Security Cameras Business Owner Bloatware Assessment Computer Tips Workforce Virtual CIO OneDrive NarrowBand Virtual Private Network Biometric Security Windows Server 2008 Tools Cables Search Tablets Peripheral Digital Security Cameras iPhone Using Data Entrepreneur Television Telecommuting Windows Media Player Copiers Project Management User 5G Nanotechnology PowerPoint Shortcut Cortana Quick Tip Ergonomics Files Smartwatch Digital Signature Cost Management Public Computer Social Networking Transportation Development Chromecast Warranty Managing Stress OLED Regulations Virtual Machine HVAC Google Apps Computer Fan Rootkit PCI DSS 2FA Colocation Fiber Optics Uninterrupted Power Supply Employee Analysis Cameras Workers Benefits Messaging Administrator Cabling Running Cable Devices Hypervisor Enterprise Content Management FENG Memory Policy Monitor IBM Dark mode Trend Micro MSP Accountants Thought Leadership Flash Credit Cards Smart Technology SMS Microchip Default App Saving Time Streaming Media Password Management Password Manager Procedure Reputation Multi-Factor Security Supercomputer dark theme Shopping Tech Support Google Search Printer Server Software Tips Content Twitter Sync Emails Techology Science AI Laptop Search Engine IT Infrastructure NIST Bing Business Mangement FinTech Customers

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code