• Managed IT Services
    • Fully Managed IT Services
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Industries
    • Healthcare Managed IT Support
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services
    • Financial Services Managed IT Support
    • Transportation and Logistics Managed IT Services, Support & Solutions
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • IT Staff Augmentation
    • Cloud Services Evaluation & Integration
    • Website Services
  • Residential Services
  • Advice
    • Weekly IT Security Tip
    • ICSI Blog – Tech Tips for Business Owners
    • Cyber Security Reports
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • Protecting & Preserving Your IT Network Security
      • The Dangers of Cybercrime to Your Company & You
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • IT Buyers Guide
  • About Us
    • Areas We Serve
      • Maryland
      • Northern Virginia
      • Washington DC
    • Business Principles
    • Testimonials
  • Contact
    • Career Opportunities

(410) 280-3000

Find Us
Support Portal
ICSIICSI
  • Managed IT Services
    • Fully Managed IT Services
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Industries
    • Healthcare Managed IT Support
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services
    • Financial Services Managed IT Support
    • Transportation and Logistics Managed IT Services, Support & Solutions
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • IT Staff Augmentation
    • Cloud Services Evaluation & Integration
    • Website Services
  • Residential Services
  • Advice
    • Weekly IT Security Tip
    • ICSI Blog – Tech Tips for Business Owners
    • Cyber Security Reports
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • Protecting & Preserving Your IT Network Security
      • The Dangers of Cybercrime to Your Company & You
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • IT Buyers Guide
  • About Us
    • Areas We Serve
      • Maryland
      • Northern Virginia
      • Washington DC
    • Business Principles
    • Testimonials
  • Contact
    • Career Opportunities

Password Strength is Key in Business and Personal Information Security

March 30, 2020 Posted by Moe Sedghi Tech Tips for Business Owners

In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is your password strength or weakness. These are the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong password strength is to leave the door wide open to identity theft and corporate piracy. Your passwords must be a robust combination of all the characters that are available, must be unique for different applications and must not be a word commonly found in any dictionaries, in any language.

How do you maximize your business and personal information security?

We have been conditioned to use weak passwords. For many people the first password we ever needed was for our ATM cards. If this is the case we were limited to the numerals on the keypad 0-9. That simply will not cut it anymore. Malicious computer deciphering programs can run through all of the possible combinations in a matter of seconds. The same types of programs can run through all of the words in the dictionary, plus most common names, in multiple languages even spelled backwards, in a matter of minutes. You cannot have the same password for all of your password needs; if that one password was to get compromised then all of your sensitive private data would be at risk.

How do you come up with strong passwords that you can actually remember, without writing them down where they could be easliy found and used to cause you or your business harm?

A good method is to come up with a phrase that is meaningfully unique to you, and therefore it will be something you will be likely to remember. For example: “I love muscle cars and custom motorcycles” or “Ping golf clubs are my favorites”

Use the first or last letter of each word to create a string or characters, from the example above: “I love muscle cars and custom motorcycles” I could come up with: “Ilmcacm” or “Iemsdms”

Replace one or more of the characters with its numeric position in the alphabet or a special character as in: Ilm3a3m or Ilmc@cm

Add a suffix or prefix to make it unique to each application that you will use it for.

  • For my Yahoo email I could use: YeIlm3a3m
  • For my Chase bank account I could use: CbIl3ma3m

Make sure that your each unique string of characters is at least eight characters long.

Now that you have a strong passwords, that last thing you need to worry about is using them wisely.

Do not write them down on a sticky note and put them under your keyboard or behind your monitor. Do not store them in the file system of your computer.

Do not use your passwords on computers that have open access to the general public, such as those found in Internet cafes, airports or mall kiosks.

Do not enter personal information such as your user names and passwords on unsecured websites.

Do make sure that the computer terminals that you use your passwords on have up to date anti-spyware and anti-virus applications.

Click here to request a Free IT Assessment and we will work with you to put together an action plan to ensure your network’s security.

Share
0

You also might be interested in

How to Create a Basic Business Disaster Recovery Plan in 4 Steps

Jan 30, 2021

Loss of data is a common problem for businesses. Fortunately,[...]

Contracting With A Managed IT Services Provider

Apr 30, 2020

When the time is right for your business to bring[...]

Maintaining HIPAA Compliance with Online Data Storage

Feb 27, 2019

Keeping patient records secure and private is the concern of[...]

Contact Us

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Schedule your FREE IT Assessment today! Contact Us

    We Manage your IT.
    You manage your business.

    Contact Us

    • ICSI
      1612 McGuckian St
      Suite 200
      Annapolis, MD 21401
    • 410-280-3000
    • Email Us

    Follow us on Facebook for Tips & News

    Home of Annapolis GEEKS

    AnnapolisGEEKS.com

    Our Partners

    • Ubiquiti Networks
    • Sonicwall
    • veeam
    • Microsoft
    • Dell
    • vmware
    • DUO

    © 2021 • ICSI • All Rights Reserved

    • Managed IT Services
    • Industries
    • IT Services & Consulting
    • Cyber Security Reports
    • About Us
    • Contact
    Prev Next