facebook linkedin twitter

Computerware Blog

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

What Is Password Checkup?

Consider how common weak passwords (things like “abc123” or “QWERTY” or “password”) are, even after the vulnerabilities that passwords like these can present have been so clearly demonstrated. There are entire lists available online discussing how common these kinds of passwords are. A whole 66 percent of surveyed Americans confess to using - and repeating - weak passwords across accounts.

Many tools have been designed to help fight these tendencies, like the password managers that many different designers have tackled - including the team at Google. One major step to accomplishing this goal was to introduce a built-in password manager to a user’s Google account and Chrome browser. Not only does this option eliminate the need for a user to remember dozens of different passwords, it simply makes them more convenient to input.

However, this didn’t really stop users from resorting to sub-par passwords, so Google has released another new feature, incorporated into its password management solution, to help users maintain proper password security. This feature is known as Password Checkup.

What Does Password Checkup Do?

Password Checkup examines the passwords that you have saved to your Google Account and confidentially analyzes them for common issues, like:

  • Involvement in a security breach - Has one of your passwords been exposed in a third-party breach to attackers?
  • Password reuse - Is a password repeated across different sites? Instead of one account being breached, this opens multiple accounts to easier misuse.
  • Insufficient password strength - How easy would someone find it to guess your password, with just a little bit of online digging to inform them?

As a result of these checks, Google can inform users when a password needs to be changed - and these alerts will also pop up in context.

This feature was made available as an extension of the Chrome Web Store in February of 2019. However, due to the importance of security, its features have been directly integrated into Chrome and Google accounts.

You can use the new password tool by going to https://passwords.google.com while logged into your Google account.

How Else Can I Improve My Passwords?

There are numerous methods that can be used to increase the security of your passwords, in addition to relying on a tool from Google. For instance:

  • Consider Using Passphrases - Passphrases are an alternative to passwords that have shown to be effective security measures, while also being more memorable to a user. Rather than trying to remember a series of random letters, numbers, and symbols, a passphrase requires a user to remember a pattern of disparate words with no context to connect them. This is inherently easier to remember, as you can create a reminder that gives you enough context to recall your passphrase.

    So, let’s say you picture a census taker reclining on a couch, smiling as he slurps down some minestrone. This image could be your reminder for a passphrase like “PollSatisfiedLoungeSip.”

  • Switch Out the Digits - Once you’ve created a passphrase that you are happy with, you can always incorporate some other password complexity tricks, like substituting different characters for others. So, returning to our example, “PollSatisfiedLoungeSip” could become “P0!!Satisfi3dL0ung3$!p.”

  • Add Details - As the time comes to update your passphrase, you may consider simply adding a detail to your imagined image. Perhaps our census taker specializes in automotive data, making our updated passphrase read: “Vr00mP0!!Satisfi3dL0ung3$!p.”

Passwords are one of the most basic fundamentals of your business’ data security, which means you have to be sure that they are able to hold their own against the many means out there to undermine them. Computerware can help you to accomplish this, and many more elements of your business IT’s security and functionality. Call (703) 821-8200 today to learn more.

Hosted VoIP Can Improve Customer Service
IT Can Be Like the Beach House of Your Dreams
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 17, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Data Hackers Microsoft Hardware Workplace Tips Backup Network Security Managed Service Provider Business Productivity Hosted Solutions Email Malware IT Services Saving Money Efficiency Computer Productivity User Tips Google IT Support Small Business Smartphones Innovation Mobile Devices Data Backup Quick Tips VoIP Business Continuity Network Gadgets IT Support Collaboration Microsoft Office communications Upgrade Data Recovery Android Social Media Server Disaster Recovery Mobile Office Cybersecurity Virtualization Communication Smartphone Miscellaneous Mobile Device Management Phishing Holiday Ransomware Windows Passwords Tech Term Operating System Windows 10 Vendor Management Apps Outsourced IT Facebook Internet of Things Managed IT Services Unified Threat Management Remote Monitoring BDR Mobile Device Automation Data Management Analytics Users BYOD Remote Computing Managed IT services Apple Mobile Computing WiFi Windows 10 The Internet of Things Marketing History Artificial Intelligence Firewall Browser Cloud Computing Save Money Help Desk Alert App Big data Spam Office 365 Training Two-factor Authentication Bandwidth Business Technology Encryption IT Consultant Going Green Hard Drives Bring Your Own Device Access Control Antivirus Gmail Maintenance Printer Managed IT Government Office Cybercrime Health Content Filtering Information Technology Cost Management Information Hiring/Firing Healthcare Windows 8 Outlook Budget Wireless Technology Computers Saving Time Search VPN Windows 7 Tech Support Virus Managed Service Recovery Employer-Employee Relationship Retail Best Practice Lithium-ion Battery Networking Hacking Project Management IBM Money Document Management Customer Service Humor It Management Travel Education Blockchain Data Loss Update iPhone Phone System Legal Save Time Current Events Hacker Downtime Customer Relationship Management Regulations Augmented Reality PowerPoint Proactive IT SaaS Computing Running Cable File Sharing Administration Hard Drive Wireless Law Enforcement Applications Intranet Twitter Compliance Mobility Website Patch Management Solid State Drive Data storage Avoiding Downtime Conferencing Risk Management Data Breach Value Password Wi-Fi Excel Digital Digital Payment Management Telephony Websites Router Machine Learning Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Company Culture Sports Cooperation Software as a Service Vendor Disaster Fax Server User Computer Repair Hosted Solution Virtual Desktop End of Support Social Networking Social Robot Data Security Securty Google Maps DDoS Storage Social Engineering Scam Black Market Flexibility Cryptocurrency Word Voice over Internet Protocol Monitoring Laptop Cortana Business Growth Business Intelligence Private Cloud Virtual Assistant Cleaning Monitors Co-managed IT Office Tips Multi-factor Authentication User Error Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Telephone Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Trending Presentation Gaming Console Unified Communications Settings Licensing Uninterrupted Power Supply Mouse Lifestyle Public Cloud Vulnerability Webcam Processor Specifications Safety Text Messaging Programming Identity Theft Statistics Bitcoin Documents Data Protection IT service Network Congestion Teamwork Heating/Cooling Distribution Entertainment Virtual Reality Downloads Politics Professional Services Automobile Inbound Marketing Emails Bluetooth Streaming Media Chromebook Smart Devices Computing Infrastructure Hack Redundancy How To eWaste Google Docs Net Neutrality Meetings Pain Points Memory Experience Chrome Download Managed Services Provider Evernote Content Management Communitications email scam Addiction Administrator Entrepreneur Directions Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Optimization Environment Dark Web Free Resource Audit CIO Supercomputer HIPAA Upselling SSID How To Fake News Advertising Flash Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet online Currency Migration Connected Devices Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Webinar Worker Emergency Hard Drive Disposal Society IT Assessment Network Management Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines G Suite Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel Human Resources Employer/Employee Relationships Debate Drones Desktop Finance Hacks Physical Security Application Harddrive Google Play Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Archive Electronic Health Records Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Memes Unified Threat Management Backup and Disaster Recovery Sync External Harddrive Browsers Electricity Printing Best Practives Username Medical IT Trend Micro Permissions Language User Tip Proactive Maintenance Gamification Notifications CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management 3D Solutions Ebay Music Piracy Upload Microserver Business Metrics Computer Malfunction Navigation Thin CLient Virtual Machine cache Television switches Writing Smart Tech Reliable Computing IT Fiber-Optic Database In Internet of Things Smart Phones Data Analysis Employees WannaCry Upgrades HTML eCommerce Telephone System PDF SQL Server Corporate Profile Recycling Mobile Security Get More Done GDPR Managing Risk Time Management Freedom of Information LiFi Analytic Adminstration Integration Pirating Information Software License Trends Turn Key Motion Sickness Best Available Keyboard Tech Leadership Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Printer Server Cost Scalability Work/Life Balance Read Fraud Tactics Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Trojan Messenger Tracking Domains Holidays Tip of the week Organize Proxy Server Azure VoIP UTM Content Rental Service Public Speaking Modem Strategy Touchscreen News Visible Light Communication Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation IT consulting Legislation Error Cabling Capital Personal Information Productuvuty Financial Surveillance Printers Managing Stress CrashOverride Regulation 3D Printing

toner1