Two Techs Solutions
  • HOME
  • ACCESS CONTROL
  • AUDIO / VISUAL
    • Remote Control Setup
    • TV Mounting
    • Whole Room Setup
  • BUISNESS SOLUTIONS
    • IT Management
    • Systems Management
    • Virtualization
  • CCTV
  • COMPUTERS & NETWORKS
    • Computer Cleaning
    • Computer Hookup
    • Computer Restore
    • Computer Setup
    • Data Backup
    • Data Recovery
    • Email Setup
    • Hardware Installation
    • Networking & Wireless Networking
    • Printer Setup
    • Printer Troubleshooting
    • Software Install & Setup
    • Technology Consultation
    • Virus & Spyware Removal
  • GALLERY
  • HOME AUTOMATIONS
  • MOBILE PHONES
  • TOOLS
    • Computer Restore Disc
    • Tips for Backing up Your Data
    • Keys to a Secure Password
    • How to Protect Against Spyware
    • Six Steps to Keeping Your Data Safe
    • Identity Theft Safety Tips
    • Comparing Cable & DSL
  • WIRING
  • CONTACT US
  • SUPPORT
    • DOWNLOADS

KEYS TO A SECURE PASSWORD

Using short, simple passwords to access your online accounts, or using the same password everywhere is a rookie mistake. It puts you at significantly higher risk of a security breach or identity theft. To increase your protection, we suggest using a combination of letters, numbers, and symbols.

Granted, when you create a password, you have to be able to remember it. But your larger concern should be keeping your information secure and private. Some sites have their own guidelines for how many and what characters can and cannot be used. We  suggests these guidelines to help you create a password that's less likely to be cracked.

SWITCH IT UP WITH YOUR CHARACTERS
  • Use at least one upper case letter
  • Use at least one lower case letter
  • Use a number
  • Use a symbol character
  • Use at least six characters
  • Don't use repeating characters
  • Don't use spaces

DON'T MAKE IT GUESS WORTHY
  • Do not use a common, dictionary word—not even spelled backwards
  • Don't use your name, a relative's name, a close friend’s name, or pet's name, either
  • Don't use personal numbers, such as your driver's license, license plate, social security, telephone, or birth date
  • It’s a good idea to change your passwords monthly. And if you must write them down, put them in a safe place and don’t include the URL
  • Use a password that is at least 8 characters long
  • Some examples of good passwords would be: Th1$isG00d!, B3nR0ck$

USE A PERSONAL ALGORITHM

This sounds harder than it is. Many people use the same passwords for everything and this can be a problem. If your email gets hacked, the criminal may also gain access to your back account if it uses the same password. But no normal human can remember random 8 character passwords for 50 different sites. To solve this quandary try creating a personal password algorithm. An algorithm is essentially a set of rules that can be applied the same way to each site, but will result in a different password. For example, maybe my algorithm is to use my dog’s name (with some special characters (rex=r#x) The second and third letters of the website name (capitalized), and my favorite number (1337). If I was creating a password for paypal.com, my password would be r#xAY1337. Using the same set of rules, I could create a password for Google.com, r#xOO1337.

By using this set of rules, I can create strong passwords that are different on each site, and the great thing is, I don’t have to remember each password, I only have to remember the algorithm.

Powered by Create your own unique website with customizable templates.
  • HOME
  • ACCESS CONTROL
  • AUDIO / VISUAL
    • Remote Control Setup
    • TV Mounting
    • Whole Room Setup
  • BUISNESS SOLUTIONS
    • IT Management
    • Systems Management
    • Virtualization
  • CCTV
  • COMPUTERS & NETWORKS
    • Computer Cleaning
    • Computer Hookup
    • Computer Restore
    • Computer Setup
    • Data Backup
    • Data Recovery
    • Email Setup
    • Hardware Installation
    • Networking & Wireless Networking
    • Printer Setup
    • Printer Troubleshooting
    • Software Install & Setup
    • Technology Consultation
    • Virus & Spyware Removal
  • GALLERY
  • HOME AUTOMATIONS
  • MOBILE PHONES
  • TOOLS
    • Computer Restore Disc
    • Tips for Backing up Your Data
    • Keys to a Secure Password
    • How to Protect Against Spyware
    • Six Steps to Keeping Your Data Safe
    • Identity Theft Safety Tips
    • Comparing Cable & DSL
  • WIRING
  • CONTACT US
  • SUPPORT
    • DOWNLOADS