Close
  • About
  • IT Solutions
  • Industries
  • Cybersecurity
  • Resources
  • News
  • Careers
  • Refer Us
  • Payment Portal
  • Home
Get Support
Linkedin
Facebook-square
Twitter

ECS + MyIT Logo
  • About
  • IT Solutions
      Outsourced IT icon

      Outsourced IT

      Hybrid IT icon

      Hybrid/Co-IT

      Phones icon

      VOIP Phones

      Cloud icon

      Cloud & Network Equipment

      Consulting & Strategy

      Audits & Assessments

  • Industries
      heartbeat icon

      Compliance

      Auto dealership icon

      Auto Dealerships

      Professional IT Services hand icon

      Professional Services

      SMBs icon

      Small Businesses

      Government building icon

      Government

      Education icon

      Education

      Construction icon

      Construction

      Non-Profit organization icon

      Non-Profit

  • Cybersecurity
  • Resources
Contact Us
ECS + MyIT Logo
  • About
  • IT Solutions
      Outsourced IT icon

      Outsourced IT

      Hybrid IT icon

      Hybrid/Co-IT

      Phones icon

      VOIP Phones

      Cloud icon

      Cloud & Network Equipment

      Consulting & Strategy

      Audits & Assessments

  • Industries
      heartbeat icon

      Compliance

      Auto dealership icon

      Auto Dealerships

      Professional IT Services hand icon

      Professional Services

      SMBs icon

      Small Businesses

      Government building icon

      Government

      Education icon

      Education

      Construction icon

      Construction

      Non-Profit organization icon

      Non-Profit

  • Cybersecurity
  • Resources
Contact Us
Cybersecurity

Cybersecurity Best Practices — Protect Your Passwords

By Holly Lawrence 

KEEP YOUR PASSWORDS COMPLETELY UNIQUE FOR EACH LOGIN, INCLUDING YOUR PERSONAL ACCOUNTS.  

Using the same password, or a similar password, across multiple systems is the most widespread cybersecurity mistake. It leaves you vulnerable to “credential stuffing attacks” where cybercriminals purchase your login information from the Dark Web and stuffs the same credentials on login pages of multiple digital services across the web from banking, social media, email, shopping, and other websites that store personal information about you.

Don’t share your password with anyone, especially over unsecured email or chat programs. In that same regard, don’t write down your password anywhere that is visible or accessible to anyone (e.g. On a sticky note on your bulletin board, under your keyboard, or taped to your monitor).

A major recommendation is to invest in a reputable password manager and to use Multi-Factor Authentication (MFA) whenever possible. By storing all of your credentials in an encrypted password manager, it allows you to have extremely secure, and difficult to remember, passwords for all of your logins. All you have to remember is the one password to log into your management software.

MFA, also known as Two-Factor Authentication (2FA), adds an additional layer of protection by requiring proof of legitimacy other than the password. This verification is usually done through a notification to a trusted phone or another device via call, text, or app.

GUIDELINES TO CREATING SECURE PASSWORDS

  • All passwords must be at least 8 characters in length. Passwords with 12 characters or more are strongly encouraged.
  • Passwords must use at least one of each of the following character types: lowercase letters, uppercase letters, numbers, and symbols.
  • Passwords should not contain any parts of your name or your company’s name (or products).
  • Suggest not using words that may be found on your public record or social media like the street you grew up on, child’s name, pet’s name, favorite team, or school mascot.

Check out https://howsecureismypassword.net/ to see how strong your passwords are – can you beat 8 SEXTILLION YEARS?

HOW TO CHANGE YOUR PASSWORD IN WINDOWS 10 

  1. Press the Ctrl + Alt + Del keys all at the same time to get to the security screen.

2.  Click “Change a password”

3.  Specify your new password following the guidelines above


Leave A Reply Cancel reply

Your email address will not be published. Required fields are marked *

*

*

What is the Dark Web? What Do I Do If My Info is on the Dark Web?
Previous Article
3 Effective Remote Management Tips for Construction Managers
Next Article
  • Categories

    • Blog
    • Business & Technology
    • Cloud Technology
    • Cybersecurity
    • DR & Data Protection
    • Industry-Specific Technologies
    • IT Compliance
    • News and Events


Explore

About Us
IT Solutions
Industries
Get Help
Contact

Disclaimer

Privacy Policy
Terms of Use
Master Client Agreement

Locations

New Orleans
6620 Riverside Drive, Suite 200
Metairie, LA 70003
504-888-6948

Shreveport
347 W. Bert Kouns Industrial Loop
Shreveport, LA 71106
318-219-3427

ECS + MyIT Logo
Linkedin
Facebook-square
Twitter
© 2020 My IT. All Rights Reserved.
  • About
  • IT Solutions
    ▼
    • Outsourced IT
    • Hybrid/Co-IT
    • VOIP Phones
    • Cloud & Network Equipment
  • Industries
    ▼
    • Compliance
    • Auto Dealerships
    • Professional Services
    • Small Businesses
    • Government
    • Education
    • Construction
    • Non-Profit
  • Cybersecurity
  • Resources
  • Contact Us
  • Get Support
  • News
  • Careers
  • Payment Portal