AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Career opportunities at splashid safe4/30/2023 ![]() For example, an address from my past that I do not use as a password “1040 Columbus Ave” has numbers, capitals, and spaces to increase the complexity of the password somewhat.Īccording to a website for testing passwords run by Kapersky Labs, Secure Password Check, this password example could be cracked by a home computer in 329 centuries and by the world’s fastest computer in four days. Some expressions that make good passwords are those that mix numbers with upper case letters.Ī good way to create these type of passwords is to use expressions or locations that have a special meaning to you. These type of passwords will have substantially greater length than any of the passwords on the above chart. The difficulty in using a long password with symbol keys and random letters is that they become difficult to remember and use.Ī simpler method of generating a password that has reasonable strength is to use longer expressions that you can remember. The strength of a password is a function of length, complexity, and unpredictability. The rating as one of the worst passwords results from the frequency of the password’s use. The passwords on the chart come from hacked passwords that have appeared on the WEB. You also may want to look at your agency’s password list, or circulate this chart, to see if anyone’s passwords should be changed. First, what a “strong password” is notīefore considering the rules for strong passwords, you might wish to peruse the following chart with the “Worst Passwords of 2011- 2015,” published by SplashData, a provider of password management applications (See below). Experts advise everyone to use “strong passwords” but often do not elaborate on the details for creating the types of passwords that are difficult to crack. The first line of defense for using computers to access business resources from an agency is the individual passwords that agency personnel use to access those resources. The five particular items relate to, “strong passwords,” “password managers,” “automatic security updates”, “anti-malware programs” and “firewall settings.” Strong passwords = Stronger Security As far as we are concerned, they have worked work well for us. We make no recommendations one way or another to the software or methods discussed, but simply state that we have used these methods and software. The free software has been used by Agency Checklist principals with good results in the past. ![]() We expect that this would take a few minutes of training or reading to implement as well as downloading some recognized cybersecurity software that’s free. The following five computer security related suggestions are simply safety plays that would ensure that your security has no inadvertent holes. Five free basic steps to check on your agency’s computers. If that is the case, we hope dear readers that you will pass this article on to friends or associates that may not be as assiduous in maintaining security in their operations as you are. Many, and hopefully all, of our readers will find that they are already applying these five simple methods. On September 30 th, President Obama proclaimed, “October 2016 as National Cybersecurity Awareness Month”, calling “…upon the people of the United States to recognize the importance of cybersecurity and to observe this month with activities, events, and training that will enhance our national security and resilience.” Our own little contribution to National Cybersecurity Awareness MonthĪgency Checklists hopes that this article on five simple free methods for enhancing the computer security in your agency contributes something to cybersecurity awareness for our readers.
0 Comments
Read More
Leave a Reply. |