Close
  • About
  • IT Solutions
  • Industries
  • Cybersecurity
  • Resources
  • News
  • Careers
  • Refer Us
  • Payment Portal
  • Home
Get Support
Linkedin
Facebook-square
Twitter

ECS + MyIT Logo
  • About
  • IT Solutions
      Outsourced IT icon

      Outsourced IT

      Hybrid IT icon

      Hybrid/Co-IT

      Phones icon

      VOIP Phones

      Cloud icon

      Cloud & Network Equipment

      Consulting & Strategy

      Audits & Assessments

  • Industries
      heartbeat icon

      Compliance

      Auto dealership icon

      Auto Dealerships

      Professional IT Services hand icon

      Professional Services

      SMBs icon

      Small Businesses

      Government building icon

      Government

      Education icon

      Education

      Construction icon

      Construction

      Non-Profit organization icon

      Non-Profit

  • Cybersecurity
  • Resources
Contact Us
ECS + MyIT Logo
  • About
  • IT Solutions
      Outsourced IT icon

      Outsourced IT

      Hybrid IT icon

      Hybrid/Co-IT

      Phones icon

      VOIP Phones

      Cloud icon

      Cloud & Network Equipment

      Consulting & Strategy

      Audits & Assessments

  • Industries
      heartbeat icon

      Compliance

      Auto dealership icon

      Auto Dealerships

      Professional IT Services hand icon

      Professional Services

      SMBs icon

      Small Businesses

      Government building icon

      Government

      Education icon

      Education

      Construction icon

      Construction

      Non-Profit organization icon

      Non-Profit

  • Cybersecurity
  • Resources
Contact Us
Cybersecurity

Password Best Practices

By Guest Post 

The first Thursday of May each year is World Password Day, a celebration to promote better password habits. “Passwords are critical gatekeepers to our digital identities, allowing us to access online shopping, dating, banking, social media, private work and life communications.” (Per National Day Calendar)

Here are our best practices for creating a strong password, along with signs of a weak password.

Suggestions for Selecting a Strong Password:

  • Use 8-12 characters
  • Utilize a combination of letters (upper & lowercase), numbers, and symbols
  • Separate your special characters between letters
  • Make passwords unique; avoid using dictionary words
  • Try a passphrase, an easy-to-remember acronym of a collection of words like a poem or catchphrase like SPPy@yC for Strong Passwords Protect You And Your Company
  • Have different passwords for your company email, personal email, and other accounts because once a hacker has access to one account, the hacker will attempt to login to other accounts with the same username and password. If a hacker accesses your email, he/she can authenticate password changes to lock you out of your own accounts.

Characteristics of a Weak Password (what you shouldn’t do):

  • Using generic words like password, easy123, your name, your username,
    or company’s name or core product
  • Using personal information that is easily accessible like date of birth,
    phone numbers, address, or names of family members
  • Using simple adjacent keyboard combinations like qwerty or 123456789
  • Using the same password for all accounts
  • Not changing your password periodically, especially after a known breach
  • Storing your password in a visible location like under your keyboard,
    on a sticky note, or on a bulletin board

Along with Using Your Strong Passwords:

  • Log off accounts when sharing a computer
  • Keep your passwords private, do not share (ESPECIALLY via email or text) with colleagues, friends, or family members
  • Enable multi-factor authentication when possible (requiring a passcode being sent to your phone) whenever possible

Along with creating a strong password, a good IT support team will confirm new users before creating new accounts, remove inactive users, and follow password best practices for their own logins.


Data Protection

Related Articles


DR & Data Protection
3 Types of Disasters That Can Destroy Your Business
Cybersecurity
What is a DDoS attack and why should you care?
DR & Data Protection
3 Places to Backup Your Company’s Data

Leave A Reply Cancel reply

Your email address will not be published. Required fields are marked *

*

*

Drones in Construction - Different Types & Uses
Previous Article
IT Untangled | Enterprise Computing Solutions
IT Untangled: What does the IT Department do?
Next Article
  • Categories

    • Blog
    • Business & Technology
    • Cloud Technology
    • Cybersecurity
    • DR & Data Protection
    • Industry-Specific Technologies
    • IT Compliance
    • News and Events


Explore

About Us
IT Solutions
Industries
Get Help
Contact

Disclaimer

Privacy Policy
Terms of Use
Master Client Agreement

Locations

New Orleans
6620 Riverside Drive, Suite 200
Metairie, LA 70003
504-888-6948

Shreveport
347 W. Bert Kouns Industrial Loop
Shreveport, LA 71106
318-219-3427

ECS + MyIT Logo
Linkedin
Facebook-square
Twitter
© 2020 My IT. All Rights Reserved.
  • About
  • IT Solutions
    ▼
    • Outsourced IT
    • Hybrid/Co-IT
    • VOIP Phones
    • Cloud & Network Equipment
  • Industries
    ▼
    • Compliance
    • Auto Dealerships
    • Professional Services
    • Small Businesses
    • Government
    • Education
    • Construction
    • Non-Profit
  • Cybersecurity
  • Resources
  • Contact Us
  • Get Support
  • News
  • Careers
  • Payment Portal