Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

What Is Password Checkup?

Consider how common weak passwords (things like “abc123” or “QWERTY” or “password”) are, even after the vulnerabilities that passwords like these can present have been so clearly demonstrated. There are entire lists available online discussing how common these kinds of passwords are. A whole 66 percent of surveyed Americans confess to using - and repeating - weak passwords across accounts.

Many tools have been designed to help fight these tendencies, like the password managers that many different designers have tackled - including the team at Google. One major step to accomplishing this goal was to introduce a built-in password manager to a user’s Google account and Chrome browser. Not only does this option eliminate the need for a user to remember dozens of different passwords, it simply makes them more convenient to input.

However, this didn’t really stop users from resorting to sub-par passwords, so Google has released another new feature, incorporated into its password management solution, to help users maintain proper password security. This feature is known as Password Checkup.

What Does Password Checkup Do?

Password Checkup examines the passwords that you have saved to your Google Account and confidentially analyzes them for common issues, like:

  • Involvement in a security breach - Has one of your passwords been exposed in a third-party breach to attackers?
  • Password reuse - Is a password repeated across different sites? Instead of one account being breached, this opens multiple accounts to easier misuse.
  • Insufficient password strength - How easy would someone find it to guess your password, with just a little bit of online digging to inform them?

As a result of these checks, Google can inform users when a password needs to be changed - and these alerts will also pop up in context.

This feature was made available as an extension of the Chrome Web Store in February of 2019. However, due to the importance of security, its features have been directly integrated into Chrome and Google accounts.

You can use the new password tool by going to https://passwords.google.com while logged into your Google account.

How Else Can I Improve My Passwords?

There are numerous methods that can be used to increase the security of your passwords, in addition to relying on a tool from Google. For instance:

  • Consider Using Passphrases - Passphrases are an alternative to passwords that have shown to be effective security measures, while also being more memorable to a user. Rather than trying to remember a series of random letters, numbers, and symbols, a passphrase requires a user to remember a pattern of disparate words with no context to connect them. This is inherently easier to remember, as you can create a reminder that gives you enough context to recall your passphrase.

    So, let’s say you picture a census taker reclining on a couch, smiling as he slurps down some minestrone. This image could be your reminder for a passphrase like “PollSatisfiedLoungeSip.”

  • Switch Out the Digits - Once you’ve created a passphrase that you are happy with, you can always incorporate some other password complexity tricks, like substituting different characters for others. So, returning to our example, “PollSatisfiedLoungeSip” could become “P0!!Satisfi3dL0ung3$!p.”

  • Add Details - As the time comes to update your passphrase, you may consider simply adding a detail to your imagined image. Perhaps our census taker specializes in automotive data, making our updated passphrase read: “Vr00mP0!!Satisfi3dL0ung3$!p.”

Passwords are one of the most basic fundamentals of your business’ data security, which means you have to be sure that they are able to hold their own against the many means out there to undermine them. Voyage Technology can help you to accomplish this, and many more elements of your business IT’s security and functionality. Call 800.618.9844 today to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management VoIP Data Recovery Smartphones AI Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Information Artificial Intelligence Automation Gadgets Cloud Computing Covid-19 Holiday Training Server Remote Work Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Apps Data Security Two-factor Authentication Vendor Mobile Office Managed Services Apple Voice over Internet Protocol App Networking Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Gmail Tip of the week Conferencing WiFi How To BDR Computing Hacker Information Technology HIPAA Avoiding Downtime Applications Office 365 Marketing Access Control Retail Big Data Healthcare Managed IT Services Operating System Computers Risk Management Router Website Virtual Private Network Analytics Office Tips Augmented Reality Health 2FA Help Desk Storage Password Bring Your Own Device The Internet of Things Remote Workers Telephone Scam Social Data loss Going Green Cooperation Free Resource Project Management Windows 7 Cybercrime Customer Service Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Display Printer Windows 11 Paperless Office Infrastructure Firewall Monitoring Excel Document Management Managed IT Service Administration Maintenance Antivirus Downloads iPhone Licensing Vulnerabilities Entertainment Data Privacy Settings Customer Relationship Management Wireless Printing Content Filtering Images 101 Robot Mobility YouTube Telephone System Multi-Factor Authentication Cost Management Hacking Presentation Cryptocurrency Wireless Technology IT Management Virtual Desktop VPN Employees Meetings Data storage Integration LiFi User Tip Modem Outlook Computer Repair Mobile Security Processor Word Holidays Money Humor Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Sports Mouse Professional Services Safety Saving Time Virtual Machines Server Management Regulations Compliance Private Cloud Identity Mobile Computing Evernote Paperless Co-managed IT Search Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Best Practice Buisness Financial Data Error History Business Communications Legal Social Engineering Break Fix Scams IT solutions Application Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Business Growth IBM Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Cortana CES Tablet IoT Communitications Trends Supply Chain Management Alert Alt Codes Downtime Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Star Wars IT Assessment How To Microsoft Excel IT Maintenance Hosted Solution Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Typing Competition Legislation Shortcuts Organization Travel Social Networking Google Maps Smart Devices Google Drive Ransmoware Knowledge Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive 5G User Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Google Docs Permissions Workforce Unified Communications Experience Unified Threat Management Directions Videos Wasting Time Threats Bitcoin Running Cable Network Congestion Specifications Security Cameras Workplace Strategies IP Address Trend Micro Google Wallet Internet Exlporer Software as a Service Fraud Meta User Error Microchip Username Managing Costs Amazon Windows 8 Laptop Black Friday SSID Recovery Point of Sale eCommerce Drones Database Surveillance Virtual Assistant Outsource IT Hard Drives Domains Network Management Tech Support IT Technicians Virtual Machine Environment Media Halloween Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Refrigeration Public Speaking Websites Mirgation Hypervisor Displays Hacks Scary Stories PowerPoint Lithium-ion battery Fun Shopping Nanotechnology Optimization Entrepreneur Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Deep Learning SharePoint Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Education Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Undo

Blog Archive