A strong password is your first defense

[tweetmeme source=LANSystems only_single=false]The evolution of computers is astounding.  The increase in computing power, bandwidth and accessibility has made almost everything people do with computers easier.  Information technology not only satisfies our need for instant gratification, but changes the rules for trivial pursuit. No doubt, computers have changed our lives.

Today’s computer looks much different from the main frame days. Back then most users had a “green” screen to input data, starting with username and password. There was little graphics and most user input was entered at a prompt.  Now, the graphics are remarkable from backgrounds to programs to games.  The modern computer and display makes the virtual world come alive in ways that were hard to imagine twenty years ago.  But with all the advancements one key feature hasn’t changed, we still use a username and password to log in.

Most computer systems still require input of the username and password to authenticate. There are some computer systems that use biometrics, digital certificates or smart cards, but even those seemingly high-tech features are still anchored in providing old fashioned authentication in the form of username/password combinations. Two-factor authentication requires two separate ways – something you know (username/password) and something you have (biometrics/smart card/digital key) – to verify identity, but even these methods have weaknesses. Still your first defense is a strong password.

Strong passwords contain upper and lower case letters, numbers, special characters and are at least 8 characters in length.  Here are a few examples:




Important accounts should have unique passwords. Even if you reuse passwords, don’t use on too many critical accounts and make sure the password is strong.  If a password is compromised, change all accounts that use that password.  You can create a less stringent password to use on non-critical accounts.

If you cannot remember all your accounts and passwords, you will have to record them.  You can keep in a password book or file, but this is where your best security can be compromised.  Keep your book behind lock and key.  Be sure to encrypt your password file and call is something innocent. (Don’t call it password.file.)  There are programs that will organize and save your accounts and passwords. To avoid malware infections, only get these programs from reliable sources. A good rule to follow is “when in doubt – don’t.”

A few password tools:

Create a strong password

Test your password strength

Generate a strong password online

If you have questions or suggestions for other topics, please leave a comment or contact me at mary@lansystems.com.

For more technical tips, please visit our website: http://www.lansystems.com/resources.html


Tags: ,

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: