Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

We’ve All Been There!

If a program mandates you to change your password, what do you do? You change it of course, but how much do you actually differ your previous password from your new one? If you’re like the majority of all computer users, chances are you change a single number. Remembering passwords is difficult, which understandably results in 66% of surveyed Americans admitting to using and repeating weak passwords such as “abc123” or “QWERTY”. 

So how can we combat our forgetfulness? Certainly not writing our passwords down and leaving them in your desk. Tooling has been developed to aid users in not only remembering passwords but making them better. Password managers, like the one from Google, are built into Google accounts as well as the Chrome browser. Not only does this eliminate the need for repetitive, unsophisticated passwords, it also makes them easier to enter. 

Unfortunately, the team at Google has noticed that despite the convenience offered with these applications, it simply was not motivating users to use more complex passwords. As a result, Password Checkup was developed. 

What Does Password Checkup Do?

Password Checkup examines the passwords that it has saved in your Google Account, and confidentially analyzes them. The examination process identifies bad password practices, such as: 

  • Security Breach Involvement - Your passwords are cross examined with known third-party breaches. 
  • Password Reuse - Nobody is perfect, we’ve all done it. However, there is no longer an excuse to reuse the same password over and over again, across multiple accounts. Tools are available to prevent headaches previously associated with complex, intricate passwords. 
  • Insufficient password strength - Password Checkup easily identifies the all too common trait of passwords -- lack of complexity. Cybercriminals’ tooling is evolving in a way that these weak passwords are no longer able to secure your account. This is why some programs mandate special characters, or capitalization. Some even rate your password strength as you enter it and mandate a minimum level of strength. 

Google now has the ability to inform users of their horrendous password practices they continue to practice every day.  

This extension has been available in the Chrome Web Store as of February 2019. Due to the importance of users locking down their personal security, this extension has been directly integrated into Chrome and Google accounts. 

It can be used by going to https://passwords.google.com while logged into your Google account!

Now Is the Time - Improve Your Passwords!

You no longer have an excuse, it’s time to step up your security. Consider using the following tips to increase your password strength and remember not to use the same password everywhere. 

Step #1: Consider Using Passphrases!

Passphrases are a simple yet effective way to step-up your password strength. Not only is using a passphrase more effective, it is also easier for a user to remember. This is due to the personalization associated with a passphrase. Rather than trying to remember randomized letters or numbers, or sacrificing security for memorability, use a passphrase! 

Let’s say for example you like Shakespeare and love the phrase “To be or not to be”. This phrase would be a great foundation for a password. 

Example: ToBeOrNotToBe

Step #2: Switch Out Some Characters!

Alright Romeo, it’s time to further enhance your security. This simple complexity trick is easy to remember as a result of the similarity you can incorporate with the characters you choose. For example, let’s modify our previous passphrase into something a bit more secure.

Example: 2B0rN0t2B

Step #3: Add Some Additional Details!

That password comes up a little short, so adding further details will inherently improve your password’s security.  Add more memorable text to your password to ensure your password is at the maximum-security level. 

Example: Jul13T2B0rN0t2B!?

Remember, don’t use this for multiple applications. That is poor password practice. Instead, if you are a Shakespeare enthusiast, use a quote from a different play and turn it into a complex, secure passphrase! 

This might seem like it might be frustrating to re-enter constantly but remember… password management tools are here to help. So are we! 415 IT can help you procure password management tools to eliminate bad password practices in the workplace. Call (415) 295-4898 today to learn more! 

Tip of the Week: Managing Your IT Inventory Manage...
The Security Risks of Using Workarounds to Get iMe...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, May 30 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud Data Recovery IT Services Efficiency Software Internet Email Managed IT Services Outsourced IT Malware Business Innovation Small Business Tech Term Cloud Computing Hackers Upgrade Windows 10 Collaboration Microsoft Cybersecurity Business Management User Tips Computer Hardware Mobile Devices Phishing Business Continuity Google Communication VoIp Managed Service Workplace Tips Ransomware Managed Service Provider Smartphones Android Paperless Office Backup Server Encryption Quick Tips Office 365 Communications Mobile Device Remote Monitoring Data Management Managed IT Disaster Recovery Network Saving Money BDR Wi-Fi Internet of Things Passwords Browser Windows 7 Healthcare Artificial Intelligence Business Technology Holiday Vulnerability Social Media Facebook Remote Work Government Document Management Miscellaneous Laptops Managed IT services Help Desk Applications Save Money Smartphone Compliance Redundancy Scam Health Processor Bandwidth Information Automation Tip of the week Microsoft Office Blockchain Data Security Vendor Management Project Management Employer-Employee Relationship Avoiding Downtime Antivirus Users Virtualization Two-factor Authentication Maintenance Analytics VPN IoT RMM Access Control BYOD Proactive Mobility Router Meetings Storage Virtual Private Network Windows Infrastructure Machine Learning IT Management OneDrive Software as a Service Website Customer Relationship Management Data Loss Company Culture Chrome Managed Services Provider Computing Remote Workers Password Apps Time Management Regulations Management Networking Co-Managed IT Flexibility File Sharing Search Mobile Security Hard Drive Unified Threat Management File Management Unified Communications Files Monitoring Payment Cards Gmail Bring Your Own Device The Internet of Things HIPAA Utility Computing Financial Risk Management Remote Monitoring and Management Cooperation Server Management Operating System Word Managed Services Office Net Neutrality Gadgets Professional Services Training Patch Management Electronic Health Records Assessment Employees Consulting Downtime Social Network Tablet Recycling Dark Web Augmented Reality Network Management Internet Exlporer Employee-Employer Relationship Alert Covid-19 Consultation Smart Technology Mobile Office Mobile Device Management Wireless Internet Big Data Cookies Cables Windows Server 2008 Customer Service Alerts Transportation Active Directory Migration eWaste Wireless Virtual Reality Touchscreen Hacking Smart Devices Vulnerabilities Favorites Travel Wasting Time Current Events Technology Laws Shadow IT CIO applications Managing Stress Emergency Multi-Factor Security Read Only Security Cameras Outlook Disaster Resistance Holidays Asset Tracking Backup and Disaster Recovery Firewall Printer Outsource IT Point of Sale Tech Terms Employer/Employee Relationships Apple Nanotechnology Wires MSP Finance Comparison Licensing Heating/Cooling Windows Server Chatbots Data Warehousing Trending Hard Disk Drives Sensors Mobile Computing Conferencing Technology Tips Database Mirgation Unified Threat Management Outsourcing Statistics Spam Enterprise Content Management Printing Legislation Notes Wearable Technology Star Wars Shortcut Proactive IT IT Human Error Distributed Denial of Service Identity Theft Enterprise Resource Planning Laptop E-Commerce Theft Proactive Maintenance Solid State Drive App Optimization Authentication Specifications Servers User Management Video Conferencing Electronic Medical Records Operations Solid State Drives Geography Lenovo Digital Payment Hotspot Voice over Internet Protocol Projects Cache Bluetooth Value of Managed Services Social Networking Samsung Remote Worker Recovery PowerPoint Display IT Consulting Business Telephone OneNote Permission Managed IT Service Information Technology Identity SharePoint Remote Working Features Cybercrime Cyber security Screen Reader Virtual Machines Authorization Black Friday Teamwork User Error Biometric Money Options Telephone Modem High-Speed Internet Superfish Politics Mouse Language Return on Investment Remote Computing Mail Merge Break Fix G Suite Private Cloud Tech Support Data Breach IT Assessment How To Test Shared resources Going Green Mobile Downloads Budget Procurement Permissions Database Management Smart Tech Credit Cards WPA3 Cyber Monday Staff Websites Address WiFi Gamification Microsoft Excel 5G Mobile VoIP Development Instant Messaging Computing Infrastructure Settings Personal Information Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Virtual Assistant Bitcoin IT Technicians Cost Management Digitize SaaS Batteries Cyberattacks Social Google Calendar Fraud GDPR Connectivity Techology Computers Fleet Tracking Zero-Day Threat Twitter Education CEO Printers Students Daniel Stevens Marketing Regulation

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...