Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Rethink Routinely Changing Your Password

Tip of the Week: Why You Should Rethink Routinely Changing Your Password

One of the main ways to keep an account’s credentials secure is by changing them consistently. However, we ran across an article recently that plays “devil’s advocate” on the password security issue, and they made some fair points about how changing passwords too frequently can lead to decreased security as a whole.

At first, this idea may not make a lot of sense. The reason that we change passwords so often is to prevent them from being used in attacks on sensitive accounts. If hackers steal passwords that don’t work, they can’t access the accounts. IT administrators often require user passwords to be changed on a regular basis, which may prompt users to choose passwords that are easy to remember or less complex than they should be.

In reality, there are several news outlets and security websites that suggest changing passwords regularly will lead to less-secure passwords as a whole. ZDNet, The Washington Post, and WIRED magazine, all suggest that frequently changing passwords, despite its intended purpose, can lead to watered-down security. Consider this scenario: you’re using a password, but are suddenly forced to change it. Would you be more likely to create a whole new password, or use a slight variation of your current password?

The Washington Post writes, “forcing people to keep changing their passwords can result in workers coming up with, well, bad passwords.” This statement is backed by research from a study performed by Carnegie Mellon University, which found that those who feel that their organization’s password policy was annoying, created passwords that were 46 percent less secure. Additionally, users who need to update their passwords constantly often leave patterns that connect old passwords to new passwords, like replacing a letter with a number or special character.

ZDNet explains that changing passwords for the purpose of securing accounts in case of stolen credentials doesn’t make sense, simply because “stolen passwords are often exploited immediately.” The security website also cites that “regularly changed passwords are more likely to be written down (another vulnerability) or forgotten,” which only seems to add to the frustration of changing passwords on a regular basis.

The fact remains that passwords may not be the most reliable way of keeping accounts safe, but there are ways that you can make using passwords, and account security, easier to handle. One way is to use an enterprise-level password manager. You can store all of your organization’s credentials in one secure location, where they will be called from and propagate in the required fields when needed. This helps you utilize complex passwords without needing to remember all of them.

Another way that you can improve account security is through two-factor authentication. This adds a second layer of security to your accounts by requiring a secondary credential, which can be sent to a smartphone via SMS message, voicemail, an alternative email account, and more. There are also biometric or GPS-tracking two-factor authentication methods that are viable (and effective).

If you’re ready to improve your business’s security practices, reach out to Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Chrome Virtualization Tech Term Saving Money Holiday Gadgets Social Media Managed Service Managed IT Services Automation Microsoft Office Artificial Intelligence Cybercrime Computers Facebook Operating System Wi-Fi Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Information Remote Spam Covid-19 Office 365 Telephone Systems Managed Service Provider Information Technology Alert Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Password Money Human Resources Mobile Computing Encryption Applications Remote Monitoring Application Data Breach Law Enforcement App History Big Data How To Apps Remote Computing Data Storage Mobile Office Patch Management Government Office Tips Private Cloud Training Blockchain Managed IT Paperless Office VPN Bring Your Own Device Settings Data Management Work/Life Balance Flexibility Two-factor Authentication Marketing Infrastructure Voice over Internet Protocol WiFi IT solutions Mouse Entertainment Website HaaS Google Drive Budget Vulnerability Windows 7 Word Avoiding Downtime Servers Wireless Gmail Data Security Machine Learning Cleaning Connectivity Firewall Remote Work Virtual Reality Apple End of Support Education Physical Security Social Safety Vendor Conferencing HIPAA User Error Managed Services Sports USB Redundancy Display Meetings Scam Keyboard Data Protection Employee/Employer Relationship Risk Management Hacker RMM Vendor Management The Internet of Things Save Time Lithium-ion battery Telephone System Staff Software as a Service Samsung Customer Service Environment Virus Update Computing Infrastructure Going Green Procurement Unified Threat Management Value Fax Server Workplace Strategy Net Neutrality Computer Accessories Spam Blocking Google Docs Electronic Medical Records Help Desk SaaS Identity Theft Battery Printing Hiring/Firing Shadow IT Legal Network Congestion Printer Managed Services Provider Augmented Reality eWaste Internet Exlporer Bluetooth Fraud Database Remote Worker PDF Remote Workers Business Intelligence Cryptocurrency Processor Audit Wearable Technology Worker Proactive IT IT Consultant Retail Hard Drives IT Management Instant Messaging Best Practice Excel Hard Drive Humor Botnet Comparison Robot YouTube Black Market IT Plan CES Biometrics Virtual Desktop Computing Unsupported Software Content Management Document Management Business Technology Wireless Technology Access Control DDoS Solid State Drive Charger How to Downtime Virtual Assistant SharePoint Compliance Authentication OneNote Computer Care Current Events Data storage Digital Signage Telephony Automobile Saving Time Project Management Nanotechnology Root Cause Analysis Telecommuting Procedure Cortana Knowledge dark theme Monitor Music Shopping Google Search HBO PowerPoint Skype Digital Signature Windows Media Player Antivirus AI User IT Infrastructure FinTech Windows 8 Warranty Bing Data loss Outlook Google Apps Leadership IT service Reputation Troubleshooting Social Network Streaming Media HVAC Investment Start Menu Analysis Content Tech Support Managing Stress Loyalty Employees Laptop Tablet Employee/Employer Relationships Administrator Devices Screen Mirroring Techology Frequently Asked Questions Domains Windows 365 Customers Books ISP Enterprise Content Management Cameras ROI MSP Mobile Accountants Audiobook Windows 10s Video Conferencing Maintenance Sales Touchpad Bitcoin Microchip Shortcuts Thought Leadership Cast IaaS Credit Cards Tip of the week Password Manager webinar Point of Sale Emergency Bloatware Personal Cryptomining Password Management Professional Services Politics Public Cloud Multi-Factor Security Advertising Employer Employee Relationship Supply Chain Management Assessment Monitoring Tablets Batteries Search Engine Twitter Windows Server 2008 Business Mangement Windows 8.1 Entrepreneur Digitize Notifications NIST Printer Server Windows Server 2008 R2 Tools Smart Tech Trending Television Shortcut Customer relationships Addiction Amazon Recycling Email Best Practices Relocation Cost Management IT Assessment Manufacturing Wiring Practices Social Networking Public Computer Computer Tips Managed IT Service Security Cameras Cache Amazon Web Services Video Games Regulations Criminal Worker Commute Virtual CIO Transportation OneDrive Biometric Security Safe Mode GDPR Hosted Computing Experience Computer Fan Running Cable Rootkit Peripheral Scalability Digital Security Cameras Memory Using Data Wireless Internet Online Shopping Business Owner Workers Benefits Copiers 5G File Sharing NarrowBand Camera Inventory FENG Specifications Quick Tip Search IBM Ergonomics Consultant Smartwatch Wire Evernote Analytics Flash Travel iPhone Smart Technology Development OLED Science Virtual Machine Printers Millennials PCI DSS Supercomputer 2FA Fiber Optics Best Available Employee Smart Office Software Tips Wireless Charging Sync Emails Files Messaging WIndows 7 Cabling Chromecast Hypervisor Virtual Private Network Distributed Denial of Service Workforce Customer Relationship Management Policy Cables Dark mode Analyitcs Trend Micro Netflix Colocation Two Factor Authentication Programming SMS Uninterrupted Power Supply Default App

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code