Categories: Articles

How Strong Are Your Passwords?

How Strong Are Your Passwords?
by Mike Gonsalves, StrategicFusion

Most people don’t realize that computer security starts with them. An easy way to hold off trouble is to use strong passwords that you change every so often.

What is a strong Password? It is a password that is easily remembered by you, contains uppercase letters, lower case letters, a number or two, a special character and is at least 8 characters in length.

Sounds hard, but it’s really easy when you use things you are familiar with.

For example, if I grew up at 245 Lucky Street, I might make my password Lucky245& Notice I’ve used Uppercase and Lowercase Letters, I have 3 numbers and a special character.

Here are some variations on the above password luCky24%, LuckY245$, luckY245* You can come up with a bunch if you just think about it a little bit.

Another example might be something you like, like Ice Cream, you could change it to 1cecr3@M Notice that I changed the first I in ice Cream to the numeral 1. The second e is represented by the number 3, sort of an E in reverse. The “a” became an @ sign.

Why go to all this bother?
It’s almost impossible to break strong passwords. Passwords that are easy to break are common words or names (like Mike, Jump, Secret, Car, Emily, or, my favorite, and yours, Password).

Don’t think for a minute that someone is actually sitting somewhere on the globe thinking about your password, they’ve automated all that. They start a software program that goes after known vulnerabilities, or specific targets that contain a lot of valuable data, like Credit Cards, Personal Identification, such as Social Security numbers, date of birth, etc. The software does the work for them.

Why do we need passwords at all? Simply put, it is a matter of Authentication. Are you who you say you are, or are you someone who is pretending to be someone else? When a you are pulled over by a police officer for speeding, the first thing he asks you for is . License and Registration. The License authenticates who you are via the photo, signature, basic information about you like eye color, date of birth, height, weight, address, etc.

The registration authenticates ownership of the vehicle. (Passports are a very good form of Authentication as well) The bottom line is this, if you don’t want someone else looking at your data, use strong passwords to protect it.  Here’s a good article on the Microsoft Website: http://technet.microsoft.com/en-us/library/cc756109.aspx

Carl Mazzanti is Co-Founder and President of eMazzanti Technologies, Microsoft’s four time Partner of the Year and one of the premier IT consulting services for businesses throughout the New York metropolitan area and internationally. Carl and his company manage over 400 active accounts ranging from professional services firms to high-end global retailers.

eMazzanti is all about delivering powerful, efficient outsourced IT services, such as computer network management and troubleshooting, managed print, PCI DSS compliance, green computing, mobile workforce technology, information security, cloud computing, and business continuity and disaster recovery.  

Carl Mazzanti is also a frequent business conference speaker and technology talk show guest and contributor at Microsoft-focused events, including frequent prominent roles at the Microsoft Inspire (Worldwide Partner Conference / WPC).

Carl, a serial Entrepreneur, gives back to the community through Entrepreneur teaching engagements at Georgetown University, the company’s ocean wildlife conservation effort, the Blue Project, and Tree Mazzanti.

Recent Posts

How to Choose an Endpoint Security Solution…and Why It Matters

Think of all the devices accessing your network, from laptops and PCs to tablets and…

6 days ago

Understand the Benefits and Limitations of Automated Tools in Penetration Testing

Penetration testing, the process of simulating cyberattacks to identify vulnerabilities, plays an essential role in…

2 weeks ago

Promote Cyber Security Through Obscurity

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. Is your organization trying to…

2 weeks ago

What Is Microsoft’s Role in the Shared Responsibility Model for Data Security?

Migrating to the cloud delivers undeniable business benefits. But it also opens the door to…

3 weeks ago

Closing the Door On Global Cyber Threats

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. One of our clients —…

3 weeks ago

Microsoft Planner vs. Project: 5 Key Differences in 2024

With the new Microsoft Planner joining the Microsoft 365 universe this year, users are taking…

4 weeks ago