Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

We’ve All Been There!

If a program mandates you to change your password, what do you do? You change it of course, but how much do you actually differ your previous password from your new one? If you’re like the majority of all computer users, chances are you change a single number. Remembering passwords is difficult, which understandably results in 66% of surveyed Americans admitting to using and repeating weak passwords such as “abc123” or “QWERTY”. 

So how can we combat our forgetfulness? Certainly not writing our passwords down and leaving them in your desk. Tooling has been developed to aid users in not only remembering passwords but making them better. Password managers, like the one from Google, are built into Google accounts as well as the Chrome browser. Not only does this eliminate the need for repetitive, unsophisticated passwords, it also makes them easier to enter. 

Unfortunately, the team at Google has noticed that despite the convenience offered with these applications, it simply was not motivating users to use more complex passwords. As a result, Password Checkup was developed. 

What Does Password Checkup Do?

Password Checkup examines the passwords that it has saved in your Google Account, and confidentially analyzes them. The examination process identifies bad password practices, such as: 

  • Security Breach Involvement - Your passwords are cross examined with known third-party breaches. 
  • Password Reuse - Nobody is perfect, we’ve all done it. However, there is no longer an excuse to reuse the same password over and over again, across multiple accounts. Tools are available to prevent headaches previously associated with complex, intricate passwords. 
  • Insufficient password strength - Password Checkup easily identifies the all too common trait of passwords -- lack of complexity. Cybercriminals’ tooling is evolving in a way that these weak passwords are no longer able to secure your account. This is why some programs mandate special characters, or capitalization. Some even rate your password strength as you enter it and mandate a minimum level of strength. 

Google now has the ability to inform users of their horrendous password practices they continue to practice every day.  

This extension has been available in the Chrome Web Store as of February 2019. Due to the importance of users locking down their personal security, this extension has been directly integrated into Chrome and Google accounts. 

It can be used by going to https://passwords.google.com while logged into your Google account!

Now Is the Time - Improve Your Passwords!

You no longer have an excuse, it’s time to step up your security. Consider using the following tips to increase your password strength and remember not to use the same password everywhere. 

Step #1: Consider Using Passphrases!

Passphrases are a simple yet effective way to step-up your password strength. Not only is using a passphrase more effective, it is also easier for a user to remember. This is due to the personalization associated with a passphrase. Rather than trying to remember randomized letters or numbers, or sacrificing security for memorability, use a passphrase! 

Let’s say for example you like Shakespeare and love the phrase “To be or not to be”. This phrase would be a great foundation for a password. 

Example: ToBeOrNotToBe

Step #2: Switch Out Some Characters!

Alright Romeo, it’s time to further enhance your security. This simple complexity trick is easy to remember as a result of the similarity you can incorporate with the characters you choose. For example, let’s modify our previous passphrase into something a bit more secure.

Example: 2B0rN0t2B

Step #3: Add Some Additional Details!

That password comes up a little short, so adding further details will inherently improve your password’s security.  Add more memorable text to your password to ensure your password is at the maximum-security level. 

Example: Jul13T2B0rN0t2B!?

Remember, don’t use this for multiple applications. That is poor password practice. Instead, if you are a Shakespeare enthusiast, use a quote from a different play and turn it into a complex, secure passphrase! 

This might seem like it might be frustrating to re-enter constantly but remember… password management tools are here to help. So are we! Telesys Voice and Data can help you procure password management tools to eliminate bad password practices in the workplace. Call (800) 588-4430 today to learn more! 

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 15 August 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Business Computing Cloud Best Practices Hackers Privacy Malware Business Email Productivity Hosted Solutions Microsoft Network Security Internet Software Productivity IT Services Computer Windows 10 Data Backup Managed Service Provider Innovation Backup Mobile Devices Ransomware Business Continuity Hardware Outsourced IT Smartphone Efficiency Google Upgrade Data Android Managed IT services User Tips Disaster Recovery Data Recovery Social Media Browser Communication IT Support Workplace Tips IT Support Business Management Small Business Managed IT Services Data Management Smartphones Cloud Computing App Office Remote Monitoring Internet of Things Phishing Miscellaneous Holiday Microsoft Office Network Server Cybersecurity VoIP Facebook Paperless Office WiFi communications Office 365 Password Windows Gmail Big Data Save Money Spam Encryption Passwords Collaboration Tech Term Artificial Intelligence Saving Money Bandwidth Firewall Customer Relationship Management Robot Apps Hosted Solution Recovery Wi-Fi Windows 10 Employer-Employee Relationship Document Management Risk Management Vendor Management Compliance Unified Threat Management Hacker Remote Computing How To Content Filtering Windows 7 Government Money Chrome Downtime Work/Life Balance Infrastructure Managed IT Office Tips Apple Avoiding Downtime Healthcare Tip of the week Analytics Customer Service Mobile Device Management Managed Service Operating System Word Data Security Data storage Applications Meetings Computing Storage Presentation Business Growth Education Software as a Service IT Management Cybercrime Virtual Reality Outlook Training Mobile Device Antivirus Redundancy SaaS BYOD Social Project Management Data loss Website BDR Business Technology Health Telephone Systems File Sharing Two-factor Authentication Hacking Mobile Computing Settings Tech Support Automation The Internet of Things Going Green Computers Vulnerability Alert Help Desk Printing Net Neutrality Assessment Samsung Licensing Proactive Analyitcs Server Management Virtual Private Network Smart Technology Bring Your Own Device Search Sports Consultation Digital Payment Remote Monitoring and Management HIPAA IT service Maintenance Cortana Router Virtualization Mobile Security Computer Care Administration Specifications IT solutions Safety User Wireless Technology Time Management Tablet Automobile Upgrades Wireless Mobility Retail Budget End of Support Access Control Best Practice Mouse IoT Lithium-ion battery YouTube Business Owner Unified Communications Legal Display Marketing LiFi Laptops Twitter Monitors Politics Travel Solid State Drive Competition Patch Management Scam Identity Theft Google Drive Websites Information Technology Physical Security Augmented Reality Regulations Taxes IBM Electronic Health Records Humor Running Cable Botnet VPN Recycling User Management IT Consultant IT Budget Scary Stories Machine Learning Social Engineering business network infrastructure Wearable Technology Cyberattacks Computer Repair Motherboard Virtual Assistant Troubleshooting Management Batteries Undo Techology Internet Exlporer Cleaning Notifications Relocation Software Tips IP Address Bookmarks Statistics Mail Merge Distributed Denial of Service Phone System Webcam Alt Codes Electronic Medical Records Google Wallet Voice over Internet Protocol Dark Data Enterprise Resource Planning Remote Work Disaster Resistance data services Crowdsourcing Private Cloud WPA3 Mobile Office IT Technicians Favorites Bluetooth Technology Tips Address Managed IT Service Point of Sale Corporate Profile Typing Drones Modem Buisness Mobile File Management Proactive IT Hotspot Quick Tips User Error Error History Fleet Tracking Mirgation Conferencing Comparison Break Fix WannaCry Cryptocurrency Knowledge Cookies Manufacturing Company Culture Telephone IT Consulting Language Printer Cabling Asset Tracking Migration Employees Black Friday Dark Web Web Server Bitcoin Update Staffing Experience Nanotechnology Gadgets iPhone Vulnerabilities Mobile VoIP Data Breach Computing Infrastructure Network Management Administrator 3D Printing Remote Workers Chatbots Zero-Day Threat Cyber Monday Data Warehousing Cameras VoIP Windows 8 Chromebook GPS Proactive Maintenance Network Congestion Geography Windows Server 2008 Domains Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Disaster Unsupported Software Information 5G Identity Backup and Disaster Recovery Entrepreneur flu season Application Lenovo Microsoft Excel CCTV Digital Emoji Tracking Utility Computing Processor Users Cables Co-Managed IT Public Speaking Unified Threat Management Cooperation Downloads Gadget PowerPoint Uninterrupted Power Supply Mobile Data Monitoring Hacks RMM Shortcut Fort Worth Superfish Blockchain Spyware Wires Business Telephone business communications systems Staff Consumers Multi-Factor Security Consulting Current Events Procurement flu shot Cost Management Active Directory Hard Drives Permissions G Suite How To Processors Laptop Virtual Desktop Biometric Internet Protocol Flexibility Heating/Cooling Google Calendar Fort Worth IT Motion Sickness Hard Disk Drive Remote Worker eWaste Hard Drive Windows Server Refrigeration Networking Fraud Firefox IT Sevices Supercomputer Halloween Google Docs Writing MSP VoIP streamlines Operations Servers Legislation DFW IT Service Deep Learning Personal Information Fun Social Networking Professional Services Environment

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code