Juvenile32InsaneMonkey! And Other Good Passwords

As your business grows, so does the likelihood of your systems being the target of cybercrime. One of the best ways to protect yourself is by enforcing the use of strong, secure passwords for yourself and your employees. If followed, the guidelines can provide you with a password that is not easily broken.

  1. Be a moving target…change your password often.
  2. Never use the same password for multiple sites. The problem is that if one site gets hacked they all get hacked. The LinkedIn hack of 2016 compromised over 117 million usernames and passwords.  Users that registered the same email address and password on other sites were at risk(and may still be!).
  3. Make sure your password is sufficiently complex.  Passwords like 12345678, password, Password1 are easily guessed. Adding complexity by mixing capitals, lower case, numbers, and special characters like !@#$%^&* makes it very difficult for other people to guess your password.
  4. Make sure your password is long enough. Computers today can guess passwords at an alarmingly fast pace.  Even medium grade hardware can run through millions of password attempts PER SECOND! Complexity makes is more difficult for people to guess your password, and length makes it harder for computers to do so.  
    • 8 character passwords take hours to crack
    • 9 character passwords can take days to crack
    • 10 character passwords can take months to crack
    • 12 character passwords can take centuries to crack
  5. Never share your password or make it easy to find. A sticky note on the bottom of your keyboard is not a secure hiding place!

At ITSecureNow we are fans of the sentence style password like “Juvenile32InsaneMonkey!” or “SmoothRed45Vase$”. These tend to be much easier to remember than randomly generated passwords like Dj$&ch#15D4. They also meet the complexity and length requirements mentioned above.

The team at ITSecurenow are experts in securing networks of all sizes. Contact us today to learn more.

This entry was posted in SecureIT and tagged , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *