Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: The Guide to Optimal Password Efficacy

Tip of the Week: The Guide to Optimal Password Efficacy

Your business’ security largely depends on how secure the passwords are that keep your resources from being accessed without authorization. Despite this, many users—perhaps even you—frequently sacrifice sufficient security measures in favor of the simple and convenient route, cutting corners when coming up with their passwords. Let’s try and remedy this by reviewing a few practices that can help make a password more effective.

What Threats are There to Passwords?

A password can be undermined in one of two different ways, generally speaking:

Digging into your online life or resorting to trickery, a “bad actor” (as they are sometimes called) figures out your password or how they can fool you into handing it over. Alternatively, the bad actor might phish you or infect your computer to crack the password.

As a result, you need to figure out how to make your passwords effectively guess-proof, while still being able to recall them as you need them. These principles should ultimately pertain to any passwords associated with your business—including the ones your staff members rely on.

The Balance Between a Strong Password and a Memorable Password

Whether you’re designing a password policy for your company members to follow, or simply creating a new account of your own, there are two important considerations to keep in mind.

  • If a hacker can’t guess/crack a password, they will likely resort to a brute force method—simply trying every combination possible until they eventually get a hit.
  • The security of a password and its resilience against brute force attacks aren’t the same.

It is important that both of these aspects are taken into serious account as you come up with your passwords.

How to Optimize Your Password Security

There are a few widely accepted best practices when it comes to what makes a good password:

  • It is sufficiently long, ideally stretching over 16 characters
  • These characters include non-consecutive numbers, letters, and symbols
  • The password contains no common words or numbers, private information, or any publicly accessible details

It is also important that your considerations involve the aforementioned tools that cybercriminals use to break password protections. This is where we must account for the complexity of your passwords.

Did you know that about 40 percent of passwords only contain lowercase letters? Well, cybercriminals certainly know, and will certainly try to save time by only trying lowercase letters in their initial brute force attacks. Even one extra variable can significantly increase the password’s security, making it harder and more time-consuming for the hacker, and possibly convincing them that the effort isn’t worth it.

However, you also need a password that is memorable enough for you to be able to use it. The most secure password in the world is no good to you if you can’t commit it to memory, to the letter (or number or symbol).

This has recently led to the idea that a password composed of a few random words, randomized further with alphanumeric substitution and capitalization, padded with repeating symbols on either side, is the most secure option.

Think about it—like we said, each variable makes the hacker’s job that much more challenging and can help slow down any automated attempts long enough for the hacker to abandon them.

With all this in mind, it makes sense to create passwords that ultimately look something like this:


Not only is this password effectively impossible to guess, but it also has plenty of characters and—while designed to be somewhat simple to memorize, is still plenty resistant to brute force methods. Just make sure you come up with your own, instead of copying this one.

Remembering These Passwords

Admittedly, a password like this is a lot to remember on its own, so the thought of remembering a different one for each account (in keeping with best practices) can be daunting for most. Fortunately, a password manager can simplify this considerably.

A password manager is basically just a piece of software that safely and securely stores your passwords away for you, accessible to you behind a single master password. That way, your passwords could be totally secure and unique without forcing you to remember them all.

From your passwords and access management to every other aspect of your business’ IT security and productivity, 415 IT is here to help. Learn more about what we can offer by calling (415) 295-4898 today.

Securing Utilities Has to Be a Priority
Google Search Now Gives More Info into What You’re...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, March 07 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud Internet IT Services Software Data Recovery Email Efficiency Managed IT Services Business Mobile Device Google Innovation User Tips Malware Collaboration Phishing Small Business Hackers Hardware Outsourced IT Cybersecurity Business Management Cloud Computing Upgrade Workplace Tips Smartphone Computer Tech Term Communication Managed Service Mobile Devices Android Microsoft VoIp Business Continuity Backup Windows 10 Covid-19 Smartphones Quick Tips Disaster Recovery Ransomware Managed Service Provider Communications Paperless Office Network Encryption Remote Work Browser Passwords Data Management Artificial Intelligence Wi-Fi Office 365 Server Business Technology Users Saving Money Managed IT BDR Social Media Internet of Things Help Desk Remote Monitoring Compliance Windows 7 Vulnerability Government Document Management Save Money Microsoft Office Healthcare Holiday Chrome Scam Automation Facebook Applications Blockchain Miscellaneous Windows Managed IT services Laptops Data Security Office Project Management Vendor Management Analytics Gadgets Avoiding Downtime Bandwidth Two-factor Authentication Mobile Office Antivirus Redundancy Wireless Virtualization Health Remote Information Processor Infrastructure Machine Learning Employer-Employee Relationship Tip of the week Information Technology Company Culture IT Management WiFi OneDrive Managed Services Data Loss Employee-Employer Relationship Training IoT Regulations Customer Relationship Management Maintenance Apps Hard Drive VPN BYOD Networking Storage RMM Router Proactive Files Access Control Meetings Virtual Private Network Software as a Service Net Neutrality Mobility Website Server Management Patch Management Data Breach Data Storage Display Smart Technology Employees Images 101 Computing Electronic Health Records Instant Messaging Social Network Consulting Downtime Assessment Professional Services Alert Flexibility Network Management Customer Service Management Mobile Security Managed Services Provider Vendor Unified Communications Consultation Remote Workers File Sharing Spam Holidays Big Data Co-Managed IT Gmail Time Management Password The Internet of Things Search HIPAA Utility Computing Risk Management Bring Your Own Device Cooperation Money Unified Threat Management Remote Computing Monitoring Remote Worker File Management Remote Monitoring and Management Free Resource Tablet Financial Dark Web Augmented Reality Payment Cards Recycling Internet Exlporer Operating System Voice over Internet Protocol Word Private Cloud Value of Managed Services IT Technicians Cost Management Google Calendar Fraud How To Test PowerPoint Motherboard Chromebook IT Assessment Connectivity Budget WPA3 Cybercrime Cyber security Downloads Credit Cards Alerts Procurement Teamwork Gamification Virtual Reality Options Telephone Migration eWaste Address End of Support Travel Return on Investment Cookies Cables Websites Bookmarks ROI CRM Vulnerabilities Digitize Firewall Social Shared resources Going Green Techology Fleet Tracking Zero-Day Threat Database Management Managing Stress Computers Customer Relationships Comparison Licensing Cyberattacks Data Warehousing 5G Mobile VoIP Chatbots Windows Server 2008 Gifts Technology Tips Mobile Device Management Settings Personal Information Nanotechnology Wires SaaS Favorites Manufacturing Mirgation Technology Laws Content Filtering Legislation Virtual Assistant Bitcoin Mobile Computing Shadow IT Distributed Denial of Service Read Only Security Cameras Batteries Wearable Technology Star Wars Outlook Disaster Resistance Asset Tracking Backup and Disaster Recovery GDPR Enterprise Content Management Emergency Multi-Factor Security Specifications Outsource IT Operations Touchscreen MSP Hacking Finance Wireless Internet Identity Theft Enterprise Resource Planning Printer Hacker Digital Payment Hotspot Point of Sale Tech Terms Transportation Active Directory App Managed IT Service Conferencing Smart Devices Cache Unified Threat Management Wasting Time Current Events Geography Outsourcing Heating/Cooling Printing CIO applications Shortcut Proactive IT Peripheral Human Error Social Networking IT Black Friday Laptop Trending Authentication Employer/Employee Relationships Apple Identity Optimization CES Mouse Language E-Commerce Theft Windows Server Screen Reader Break Fix Statistics Hard Disk Drives Sensors Banking Electronic Medical Records Database Modem High-Speed Internet Lenovo Video Conferencing Servers Tech Support IT Consulting PCI DSS Permissions OneNote Permission Notes G Suite Samsung Business Telephone Cyber Monday Staff Remote Working Microsoft Excel Authorization Proactive Maintenance Solid State Drive Mobile SharePoint Virtual Machines Computing Infrastructure Features User Management Smart Tech Biometric Bluetooth Politics Solid State Drives Mail Merge User Error Reviews Recovery Projects Development Superfish Daniel Stevens Marketing Regulation Twitter Printers Education CEO Students

Latest Blog

A lot of business is being conducted over the Internet right now, in terms of communication and transactions alike, which makes a business’ capability to remain connected to its clientele even more important. Now is not the time to wonder if your business is as connected as ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...