Mytek Logo
MyTek Logo

Tip of the Week: Taking Your Password Practices to the Next Level

by | Dec 11, 2019 | MyTek Blog, Security


Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

Passwords are necessary and annoying at the same time. They play a pivotal role in ensuring business security. Passwords should not just be secure; they also need to be helpful.  Let’s explore why it is essential to use great password practices, and setting passwords is just the beginning of something new for your organization. 

Don’t Neglect These Time Tested Rules

You should use an easy-to-remember password, but at the same time, you should not allow the hackers to guess it easily. Here are the top-15 results of data analysis from the security website Have I Been Pwned:

  1. 123456 
  2. qwerty 
  3. password
  4. 1111111 
  5. abc123 
  6. 1234567 
  7. 12345678 
  8. 12345 
  9.  Password1
  10. 1234567890
  11. 000000 
  12. 1123123 
  13. 1234 
  14. Iloveyou

Many of these passwords do not comply with best password practices, like a good mix of character types, and adequate password length. Instead people simply use easily guessable words, like “password” or “qwerty.” 

The worst part is that many owners would have reused these passwords across different accounts. Reusing can compromise the security of different accounts.

It is not a good practice to use the same password to log in to multiple accounts. In doing so, if one account is hacked, all the other accounts will naturally be put at risk.

How to Secure Your Account?

There are different ways to secure your account. Try using a  passphrase – a series of random words, rather than picking a set of characters. It is more secure than most passwords and is easier to remember.

There comes more difficulties when the human element is involved. Human beings are more attracted to patterns and face difficulties in random words.

A developer named Arnold Reinhold created Diceware, a software to generate a passphrase for yourself to tackle this problem.

Using the Diceware word list, roll five dice (or one die, five times), and to the corresponding value you can find an appropriate word. Repeat this process until you get 6-7 words, which form your paraphrase.

Why should you use the dice? It makes the process completely random than you “randomly” selecting words from a list of words.

An Example

Imagine that you randomly rolled the following numbers on the dice:

  • 21633
  • 31336
  • 16521
  • 13263
  • 33535
  • 52452

The corresponding words to this list of numbers are: 

  • Criss
  • Gluing
  • Choke
  • Bambi
  • Ice
  • Rust

This gives us the paraphrase.

However, many users hesitate to use passphrases because they have to remember six random words for each account.

This is why password managers are essential. When you use a password manager to save your passphrases, you can secure all your accounts and passwords with a single credential.

For different ways to enhance your business technology, subscribe to our blog, or reach out to us to know about MyTek, an Arizona-based IT firm, at 623-312-2440.


Tim - Team

Tim Tiller, LMSW

Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.


Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.


Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Generated by Feedzy
Share This