Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

We’ve All Been There!

If a program mandates you to change your password, what do you do? You change it of course, but how much do you actually differ your previous password from your new one? If you’re like the majority of all computer users, chances are you change a single number. Remembering passwords is difficult, which understandably results in 66% of surveyed Americans admitting to using and repeating weak passwords such as “abc123” or “QWERTY”. 

So how can we combat our forgetfulness? Certainly not writing our passwords down and leaving them in your desk. Tooling has been developed to aid users in not only remembering passwords but making them better. Password managers, like the one from Google, are built into Google accounts as well as the Chrome browser. Not only does this eliminate the need for repetitive, unsophisticated passwords, it also makes them easier to enter. 

Unfortunately, the team at Google has noticed that despite the convenience offered with these applications, it simply was not motivating users to use more complex passwords. As a result, Password Checkup was developed. 

What Does Password Checkup Do?

Password Checkup examines the passwords that it has saved in your Google Account, and confidentially analyzes them. The examination process identifies bad password practices, such as: 

  • Security Breach Involvement - Your passwords are cross examined with known third-party breaches. 
  • Password Reuse - Nobody is perfect, we’ve all done it. However, there is no longer an excuse to reuse the same password over and over again, across multiple accounts. Tools are available to prevent headaches previously associated with complex, intricate passwords. 
  • Insufficient password strength - Password Checkup easily identifies the all too common trait of passwords -- lack of complexity. Cybercriminals’ tooling is evolving in a way that these weak passwords are no longer able to secure your account. This is why some programs mandate special characters, or capitalization. Some even rate your password strength as you enter it and mandate a minimum level of strength. 

Google now has the ability to inform users of their horrendous password practices they continue to practice every day.  

This extension has been available in the Chrome Web Store as of February 2019. Due to the importance of users locking down their personal security, this extension has been directly integrated into Chrome and Google accounts. 

It can be used by going to https://passwords.google.com while logged into your Google account!

Now Is the Time - Improve Your Passwords!

You no longer have an excuse, it’s time to step up your security. Consider using the following tips to increase your password strength and remember not to use the same password everywhere. 

Step #1: Consider Using Passphrases!

Passphrases are a simple yet effective way to step-up your password strength. Not only is using a passphrase more effective, it is also easier for a user to remember. This is due to the personalization associated with a passphrase. Rather than trying to remember randomized letters or numbers, or sacrificing security for memorability, use a passphrase! 

Let’s say for example you like Shakespeare and love the phrase “To be or not to be”. This phrase would be a great foundation for a password. 

Example: ToBeOrNotToBe

Step #2: Switch Out Some Characters!

Alright Romeo, it’s time to further enhance your security. This simple complexity trick is easy to remember as a result of the similarity you can incorporate with the characters you choose. For example, let’s modify our previous passphrase into something a bit more secure.

Example: 2B0rN0t2B

Step #3: Add Some Additional Details!

That password comes up a little short, so adding further details will inherently improve your password’s security.  Add more memorable text to your password to ensure your password is at the maximum-security level. 

Example: Jul13T2B0rN0t2B!?

Remember, don’t use this for multiple applications. That is poor password practice. Instead, if you are a Shakespeare enthusiast, use a quote from a different play and turn it into a complex, secure passphrase! 

This might seem like it might be frustrating to re-enter constantly but remember… password management tools are here to help. So are we! 415 IT can help you procure password management tools to eliminate bad password practices in the workplace. Call (415) 295-4898 today to learn more! 

Tip of the Week: Managing Your IT Inventory Manage...
Getting Your iMessages on Windows 10
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, November 15 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Data Network Security Hosted Solutions IT Support Data Recovery Privacy Cloud Software IT Services Email Outsourced IT Malware Tech Term Internet Managed IT Services Business User Tips Innovation Computer Windows 10 Efficiency Hackers Cloud Computing Small Business Upgrade Business Management Microsoft Collaboration Ransomware Google Hardware Phishing Managed Service Paperless Office Cybersecurity Business Continuity VoIp Workplace Tips Mobile Devices Android Communication Managed Service Provider Encryption Communications Server Office 365 Remote Monitoring Managed IT Smartphones Backup Internet of Things Passwords Artificial Intelligence Vulnerability Disaster Recovery Wi-Fi Help Desk Government Save Money Document Management Quick Tips Healthcare Saving Money Browser Applications Mobile Device BDR Managed IT services Holiday Data Management Laptops Business Technology Scam Redundancy Avoiding Downtime Windows 7 Antivirus Bandwidth Automation Microsoft Office Compliance Blockchain Processor Smartphone Tip of the week Project Management Employer-Employee Relationship Information Vendor Management Chrome Two-factor Authentication IT Management Router VPN Analytics Customer Relationship Management Machine Learning Social Media Website Access Control BYOD Windows Data Security Infrastructure RMM Miscellaneous Smart Technology Alert Proactive Gadgets Storage Monitoring Maintenance Bring Your Own Device Assessment HIPAA Utility Computing Financial Remote Monitoring and Management Users Networking Operating System Network Management Search Mobile Security OneDrive Professional Services Training Consultation Employees Unified Communications Facebook Recycling Downtime Files Employee-Employer Relationship Virtual Private Network The Internet of Things Company Culture Gmail Cooperation Network Risk Management Word Remote Workers Password Unified Threat Management Apps Software as a Service Net Neutrality Regulations Patch Management IoT Management Mobility Hard Drive Tablet File Sharing Internet Exlporer File Management Server Management Data Loss Dark Web Google Calendar Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Proactive Maintenance Solid State Drive App Authentication Voice over Internet Protocol Projects Cache Electronic Medical Records Computing Alerts Solid State Drives Payment Cards Geography Meetings OneNote Permission Travel Value of Managed Services Websites Social Networking Technology Laws Remote Worker Virtual Reality PowerPoint Display Authorization Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Cybercrime Screen Reader Emergency Multi-Factor Security Return on Investment Remote Computing Comparison Licensing Options Telephone Modem High-Speed Internet Printer Politics How To Test Technology Tips Managed Services SaaS G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Tech Support WPA3 Legislation Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech Settings Personal Information Consulting Specifications 5G Touchscreen Mobile VoIP Hacking Development Instant Messaging Cost Management Lenovo Digital Payment Hotspot Manufacturing Time Management Vendor Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Fleet Tracking Zero-Day Threat Virtualization Batteries Heating/Cooling IT Consulting Cyberattacks Social Managed IT Service GDPR Connectivity Samsung Transportation Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Wireless Internet Big Data Trending Cookies Cables SharePoint Customer Service Superfish Wireless Mouse Language Smart Devices Statistics Vulnerabilities Mail Merge User Error Favorites Money Wasting Time Current Events Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Servers Managing Stress Data Breach Read Only Security Cameras Break Fix Permissions Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Recovery Mirgation Computing Infrastructure Hard Disk Drives Sensors Bluetooth Mobile Computing Address WiFi Conferencing Microsoft Excel Database Human Error Spam Enterprise Content Management Printing Augmented Reality Notes Wearable Technology Star Wars Students Marketing Daniel Stevens Cyber security Regulation Twitter Education CEO Printers

Latest Blog

In managing business technology, we are always talking about downtime--how expensive downtime is, how downtime hurts productivity, how there are a multitude of separate situations that can cause downtime. That kind of doom and gloom may not get you to act, but it may just pu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...