Data Privacy: What are the Risks?

If you are handling PII (Personally Identifiable Information) for your clients or anyone else you should read this article. It is delivered in the context of a sweepstakes type of program, but it is applicable to anyone handling PII. The [...]

Data Privacy: What are the Risks?2017-11-13T07:22:40-08:00

Is password length more important than complexity? A guideline for password creation policy.

Orange County, CA - I just read a summary of research on secure passwords vs. weak ones that get hacked. If you are looking to create your own secret password or if you are a network administrator looking to enforce secure password policy then read on. These results are from a study on 10 million passwords that have been breached in recent years.

In summary, if you want a weak password, then use:

  • Words
  • Names
  • Verbs
  • Colors
  • Animals
  • Fruits
  • “Love” phrases
  • Superheroes
  • And days of the week
  • Leet speak, the act of using informal language or code in which standard letters are often replaced by numerals or special characters such as “n00b” or “gue55able”
  • Most importantly, don’t use patterns on your keyboard or phone dialer pad. Those are at the very top of the list of quickly decoded passwords....
Is password length more important than complexity? A guideline for password creation policy.2016-08-17T03:18:52-07:00