Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

What Is Password Checkup?

Consider how common weak passwords (things like “abc123” or “QWERTY” or “password”) are, even after the vulnerabilities that passwords like these can present have been so clearly demonstrated. There are entire lists available online discussing how common these kinds of passwords are. A whole 66 percent of surveyed Americans confess to using - and repeating - weak passwords across accounts.

Many tools have been designed to help fight these tendencies, like the password managers that many different designers have tackled - including the team at Google. One major step to accomplishing this goal was to introduce a built-in password manager to a user’s Google account and Chrome browser. Not only does this option eliminate the need for a user to remember dozens of different passwords, it simply makes them more convenient to input.

However, this didn’t really stop users from resorting to sub-par passwords, so Google has released another new feature, incorporated into its password management solution, to help users maintain proper password security. This feature is known as Password Checkup.

What Does Password Checkup Do?

Password Checkup examines the passwords that you have saved to your Google Account and confidentially analyzes them for common issues, like:

  • Involvement in a security breach - Has one of your passwords been exposed in a third-party breach to attackers?
  • Password reuse - Is a password repeated across different sites? Instead of one account being breached, this opens multiple accounts to easier misuse.
  • Insufficient password strength - How easy would someone find it to guess your password, with just a little bit of online digging to inform them?

As a result of these checks, Google can inform users when a password needs to be changed - and these alerts will also pop up in context.

This feature was made available as an extension of the Chrome Web Store in February of 2019. However, due to the importance of security, its features have been directly integrated into Chrome and Google accounts.

You can use the new password tool by going to https://passwords.google.com while logged into your Google account.

How Else Can I Improve My Passwords?

There are numerous methods that can be used to increase the security of your passwords, in addition to relying on a tool from Google. For instance:

  • Consider Using Passphrases - Passphrases are an alternative to passwords that have shown to be effective security measures, while also being more memorable to a user. Rather than trying to remember a series of random letters, numbers, and symbols, a passphrase requires a user to remember a pattern of disparate words with no context to connect them. This is inherently easier to remember, as you can create a reminder that gives you enough context to recall your passphrase.

    So, let’s say you picture a census taker reclining on a couch, smiling as he slurps down some minestrone. This image could be your reminder for a passphrase like “PollSatisfiedLoungeSip.”

  • Switch Out the Digits - Once you’ve created a passphrase that you are happy with, you can always incorporate some other password complexity tricks, like substituting different characters for others. So, returning to our example, “PollSatisfiedLoungeSip” could become “P0!!Satisfi3dL0ung3$!p.”

  • Add Details - As the time comes to update your passphrase, you may consider simply adding a detail to your imagined image. Perhaps our census taker specializes in automotive data, making our updated passphrase read: “Vr00mP0!!Satisfi3dL0ung3$!p.”

Passwords are one of the most basic fundamentals of your business’ data security, which means you have to be sure that they are able to hold their own against the many means out there to undermine them. Voyage Technology can help you to accomplish this, and many more elements of your business IT’s security and functionality. Call 800.618.9844 today to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 20 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Business Innovation Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Privacy Workplace Tips Computer Google Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Communication Small Business Smartphones Mobile Device Saving Money communications Android Business Management Mobile Devices Workplace Strategy Smartphone VoIP Managed IT Services Data Recovery Microsoft Office Managed Service Browser Upgrade Social Media Passwords Backup Disaster Recovery Network Tech Term Internet of Things Automation Artificial Intelligence Cloud Computing Remote Covid-19 Remote Work Server Managed Service Provider Facebook Miscellaneous Windows Gadgets Spam Outsourced IT Encryption Employee/Employer Relationship Holiday Windows 10 Information Data Management Business Continuity Government Windows 10 Wi-Fi Business Technology Productivity Blockchain Virtualization Two-factor Authentication Apps Bandwidth Compliance Data Security Current Events Vendor Mobile Device Management Gmail Managed Services Voice over Internet Protocol Chrome Employer-Employee Relationship Budget Networking Office Apple App Applications Computing Information Technology Access Control Office 365 Conferencing Hacker How To Avoiding Downtime BDR Mobile Office Router BYOD Operating System Virtual Private Network Training Risk Management Help Desk WiFi Health Big Data Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Computers Bring Your Own Device Managed IT Services AI Website Marketing HIPAA Vendor Management Windows 11 Firewall Cybercrime Display Printer Excel Paperless Office The Internet of Things Monitoring Infrastructure Social Remote Workers Tip of the week Document Management IT Support Telephone Free Resource Scam Customer Service Project Management Data loss Cooperation Windows 7 Microsoft 365 Patch Management Solutions Save Money Going Green Remote Monitoring Vulnerability End of Support Settings Printing Wireless IT Management VPN Meetings Content Filtering User Tip Modem YouTube Processor Holidays 2FA Mobile Security Supply Chain Safety Cryptocurrency Computer Repair Data Storage Video Conferencing Managed Services Provider Smart Technology Virtual Desktop Virtual Machines Professional Services Data storage LiFi Saving Time Machine Learning Outlook Managed IT Service Money iPhone Humor Downloads Customer Relationship Management Data Privacy Maintenance Antivirus Licensing Vulnerabilities Sports Entertainment Hacking Mouse Images 101 Presentation Multi-Factor Authentication Mobility Administration Wireless Technology Telephone System Cost Management Robot Employees Integration Word Managing Costs Unified Threat Management Specifications Alt Codes Outsource IT Environment Downtime Microchip eCommerce Media Refrigeration Internet Exlporer SSID Fraud Hosted Solution Network Congestion Surveillance Public Speaking Username Virtual Assistant Virtual Machine User Error Black Friday Typing Physical Security Small Businesses Lithium-ion battery Reviews Displays Database Medical IT Entrepreneur IT Technicians Google Drive Point of Sale Development Knowledge Transportation Proxy Server Hypervisor Cookies Cyber Monday Outsourcing Tech Support Shopping Optimization Undo 5G Tactics PowerPoint Network Management Hotspot Mirgation Google Docs Unified Communications Monitors Workplace Experience Employer/Employee Relationships Running Cable Nanotechnology Navigation Bitcoin PCI DSS Hiring/Firing Google Wallet Websites Gig Economy Paperless Addiction Language Chatbots Internet Service Provider Co-managed IT Management Teamwork Regulations Compliance Technology Care Laptop Application SharePoint Screen Reader Evernote Distributed Denial of Service Windows 8 Electronic Medical Records Drones Memes Business Communications Service Level Agreement Computing Infrastructure SQL Server Lenovo Identity Writing Net Neutrality Scams IBM Financial Data Hybrid Work Halloween Bookmark History Smart Tech Virtual Reality Server Management Alerts Private Cloud Smartwatch IT Human Resources Download Azure Superfish Identity Theft Procurement Cables Hacks Twitter Telework Scary Stories Browsers Cyber security Connectivity Tech Break Fix Error CES Communitications Google Apps Competition Fun Upload Social Network Multi-Factor Security Deep Learning Social Engineering Supply Chain Management IT Maintenance Remote Computing FinTech Business Intelligence IoT Term Dark Web Education IT Assessment Shortcuts Trends Customer Resource management Value User Regulations Tablet Google Calendar Flexibility Ransmoware Mobile Computing Alert Organization Vendors Data Analysis Star Wars Microsoft Excel Managed IT Staff File Sharing Digital Security Cameras Dark Data Smart Devices Be Proactive Search Gamification Memory Social Networking Legislation Best Practice How To Remote Working Workforce IP Address Notifications Threats Buisness Fileless Malware Data Breach Google Play Wearable Technology Legal Travel Videos IT solutions Electronic Health Records Workplace Strategies Content Health IT Wasting Time Recovery Techology Motherboard Google Maps Comparison Business Growth Meta Amazon Directions Trend Micro Hard Drives Assessment Security Cameras Permissions Unified Threat Management Software as a Service Domains Cortana

Blog Archive