Are You Having A Technology Emergency?

Datalyst Blog

Datalyst has been serving the Massachusetts area since 2010, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Tip of the Week: Building Strong Password Practices

Tip of the Week: Building Strong Password Practices

Passwords are just one part of a comprehensive security strategy, but they are a crucial one. You must make sure that you are investing adequate time and effort into making sure your passwords are secure. This is easier said than done, but by the end of today’s short blog article, you’ll have all the information you need to craft excellent passwords for your accounts.

What Are Some Password Best Practices?

In a list format, we have put together some password best practices for your review:

  • Use complex strings of characters: Your passwords should consist of both upper and lower-case letters, numbers, and special characters.
  • The longer, the better: If you have more characters in your password, there are more opportunities for a hacker to get it wrong. Your passwords should be easy to remember, but hard to guess.
  • Opt for passphrases rather than passwords: To make your passwords easier to remember, you can use a passphrase. The passphrase is basically an upgraded password variant that is harder to guess, but easier to remember. For example, if you were to use a favorite ’80s movie, you might pull a famous line from the movie along with the title and tie it together. For example, if your favorite movie of all time is Short Circuit, you might make your passphrase Sh0rtCIRCUIT#5isALIVE!86
  • Use different passwords for each account: You should be using different passwords for each of your accounts, just in case one of them gets stolen. After all, if you use the same password for every account, you’ll have to change every single one of them anyway.

With these practices, you can make more complex and secure passwords. In addition to these practices, you can consider some of the following to make using them easier and more efficient.

What Else Can You Do to Protect Your Online Accounts?

To capitalize on the benefits of password security for your business, we recommend that you take things just a hair further with additional policies and technology solutions. We recommend multi-factor authentication and password management solutions to get the most out of your password and authentication policies.

With multi-factor authentication, you can use additional authentication protocols alongside passwords to maximize security. Your average multi-factor authentication tool will utilize two of the three methods: something you are (biometrics), something you have (smartphone, USB key), or something you know (a password, PIN, or passphrase).

In comparison, password management tools take what you have applied to your password security and make them that much easier to manage. Password managers store your passwords in an encrypted database where they are protected by a master password. You can then call the passwords as they are needed when you access your accounts. Password managers often have the capabilities to generate passwords for you, just in case you need some help with your complex passwords. It makes using complex passwords and passphrases that much easier.

Datalyst is here to help outfit your business with the security and productivity tools it needs. Give us a call at (774) 213-9701 to learn more.

Ten Cybersecurity Issues We Can Help Protect Your ...
Is Your Business Outgrowing Its IT Department?
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, November 12 2024

Captcha Image

Contact Us

Learn more about what Datalyst can do for your business.

Call Us Today
Call us today
(774) 213-9701

10 Riverside Drive
Suite 106

Lakeville, Massachusetts 02347

The United States Patent and Trademark Office reference number: 5,341,888

Latest Blog

Can you tell the difference between your colleagues and a scammer with access to their email account? This is essentially what a business email compromise attack involves—a scammer initiates a phishing scheme using an internal mode of commu...
 

Best IT Managed Service Providers in Providence

TOP