Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

The method in question suggests that passwords chosen by your average PC user aren’t nearly as secure as they should be, but are very easy to remember. As explained in an essay from the university of Southern California, written by Marjan Ghazvininejad and Kevin Knight, it’s best to use randomly generated 60-bit strings (basically, a series of 60 ones and zeros), and convert these strings into words or phrases.

Confused? Let us explain a little more in detail. This method is derived from a XKCD comic (which you can find here) that describes the difficulty of remembering passwords. Basically, what it entails is taking a string of numbers, like 10101101010100101101010101010101010110101101, and converting segments of this code into words to create an English phrase. The above string would wind up reading “correct horse battery staple,” which is complete and utter nonsense, but very easy to remember by associating it with a mental image or a story.

Rather than use a 44-bit string like the above example, Ghazvininejad and Knight suggest using a 60-bit string to increase security, and to create a poem-like string of words that makes sense and is easy to remember. Going too in-depth into this method would take a considerable amount of time to explain, but the basic idea is to create something that’s easy to remember while making it borderline impossible for a computer to guess. By today’s standards, the 44-bit string would take around an hour to crack, while a 60-bit string would take well over a decade. How’s that for secure?

While using segments from existing poems is a possibility, Knight and Ghazvininejad don’t suggest doing so. Considering how there are millions of poems online, the chances of getting hacked are much higher than if the string of characters were truly random. However, while using a line from your favorite poem isn’t as secure as a string of 60 characters, it’s certainly more secure than using a simple password like “MOM385” or “password.” On one hand, you’re using real words that can be used in a dictionary attack; but on the other, you’re using a long password (which is a best practice). So, it’s really up to you to decide how you want to approach password security.

Of course, you’ll need multiple passwords for all of your different accounts. This in itself can make memorizing passwords a huge pain. Therefore, the best way that you can remember all of your passwords and effectively use them to maximize your account security, is by taking advantage of a password manager. Total Tech Care can help your business get set up with the best password manager on the market. To learn more, give us a call at 866-348-2602.

 

Comments 1

Kara AGarcia on Tuesday, 24 July 2018 08:09
What [url=https://www.uk.com/]a review[/url] https://www.uk.com/how-do-you-do.html
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Cloud Computing Office Data Recovery Server Save Money Windows 10 Passwords Chrome Tech Term Virtualization Gadgets Saving Money Holiday Social Media Microsoft Office Managed IT Services Automation Managed Service Operating System Cybercrime Computers Artificial Intelligence Facebook Health Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Networking IT Support Spam Alert Office 365 Remote Telephone Systems Information Technology Covid-19 Information Managed Service Provider Social Engineering Mobility BDR Bandwidth Recovery Employer-Employee Relationship Router Big Data Human Resources Law Enforcement Remote Monitoring Mobile Computing Password Money Application App History Encryption Applications Data Breach Government Remote Computing Private Cloud Mobile Office How To Managed IT Apps Office Tips Data Storage Patch Management Blockchain Training Paperless Office VPN Infrastructure Voice over Internet Protocol Two-factor Authentication Avoiding Downtime Data Security Mouse Flexibility HaaS Marketing WiFi IT solutions Bring Your Own Device Data Management Entertainment Work/Life Balance Website Budget Wireless Vulnerability Windows 7 Word Gmail Google Drive Settings Servers RMM Virtual Reality Apple Social User Error Save Time Data Protection Meetings Cleaning Risk Management USB Hacker Conferencing Vendor End of Support The Internet of Things Education Physical Security Lithium-ion battery Scam Managed Services Telephone System Staff Software as a Service Display Safety Machine Learning HIPAA Sports Redundancy Connectivity Remote Work Firewall Keyboard Employee/Employer Relationship Vendor Management Unsupported Software Identity Theft Best Practice YouTube Charger Computing SaaS Black Market Compliance Computer Care Virus Augmented Reality OneNote Fraud Network Congestion Current Events Unified Threat Management eWaste Document Management Telephony Wireless Technology Samsung Computer Accessories Remote Worker Digital Signage Solid State Drive How to Downtime Cryptocurrency Value Data storage Procurement Wearable Technology Automobile Spam Blocking Electronic Medical Records Hard Drives Printer Workplace Strategy Comparison Net Neutrality Retail Bluetooth Instant Messaging CES Help Desk Robot Computing Infrastructure Excel Hiring/Firing Going Green Printing Biometrics Business Technology Content Management Virtual Desktop Access Control Managed Services Provider Battery IT Consultant Virtual Assistant DDoS Shadow IT Authentication Database Legal Business Intelligence SharePoint Humor Remote Workers Audit Internet Exlporer Worker IT Management Processor Botnet Update Customer Service PDF Environment IT Plan Hard Drive Google Docs Fax Server Proactive IT IT service Video Games WIndows 7 IBM Administrator Devices Copiers 5G Worker Commute Flash Smart Technology Enterprise Content Management Quick Tip Tablet MSP Ergonomics Accountants Experience Smartwatch Domains Scalability Software Tips Supercomputer Microchip Thought Leadership Development Credit Cards OLED Password Management PCI DSS Password Manager Virtual Machine Business Owner Sync Emails NarrowBand 2FA Fiber Optics IaaS Multi-Factor Security Employee Maintenance Cabling Search User Bloatware PowerPoint Search Engine Windows Media Player Twitter Messaging NIST Policy Business Mangement Hypervisor iPhone Netflix Two Factor Authentication Tablets Dark mode Smart Tech Trend Micro Trending Root Cause Analysis Amazon Default App HBO Managing Stress Entrepreneur Knowledge Music Addiction SMS Procedure Recycling Saving Time Skype Files Chromecast Cameras Wiring dark theme Practices Shopping Google Search Shortcut Data loss Amazon Web Services IT Infrastructure Outlook Cost Management Leadership Troubleshooting Cache AI Safe Mode FinTech Criminal Start Menu Bing Social Networking Colocation Uninterrupted Power Supply Loyalty GDPR Hosted Computing Social Network Screen Mirroring Online Shopping Investment Frequently Asked Questions Monitor Books Wireless Internet File Sharing Employees Employee/Employer Relationships Running Cable Mobile Windows 10s Memory Printer Server Camera Windows 365 Inventory Specifications ISP Cast Evernote ROI Tip of the week Reputation webinar Streaming Media Emergency Wire Video Conferencing Sales Bitcoin Content Professional Services Travel Shortcuts Public Cloud Tech Support Employer Employee Relationship Laptop Assessment Printers Point of Sale Personal Millennials Cryptomining Techology Wireless Charging Windows Server 2008 Customers Smart Office Supply Chain Management Monitoring Batteries Audiobook Tools Science Touchpad Television Virtual Private Network Windows 8.1 Digitize Workforce Cables Windows Server 2008 R2 Customer relationships Distributed Denial of Service Politics Customer Relationship Management Advertising Analyitcs Public Computer Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing Cortana Regulations Programming Notifications Transportation Computer Tips Digital Signature Managed IT Service Security Cameras Computer Fan Consultant Rootkit Analytics Warranty Virtual CIO OneDrive Biometric Security Google Apps Antivirus Relocation Workers Benefits HVAC Peripheral Digital Security Cameras Analysis Using Data FENG Best Available Windows 8

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code