It’s Time to Stop Using Weak Passwords, Period

It’s Time to Stop Using Weak Passwords, Period

Simple passwords are often the bane of a business’ existence. If you routinely use strings like Password, 123456, Guest,  or Qwerty to secure an account, then you need to reexamine your password practices before they lead to a data breach. A good password can go a long way toward helping you in this effort.

In the case of the password, it’s often beneficial to know what not to do in addition to what you should do.

What Makes for a Bad Password?

Bad passwords are a little bit of a misnomer these days, especially as passwords are simply not the ideal way to protect important information anymore; rather, they should be a part of a multi-factor authentication solution. But alas, that’s not why we are here today. Passwords are still popular methods of protecting accounts, so we have to go over what makes them effective or ineffective.

Passwords are bad when they are not as secure as they need to be, which could be for a variety of reasons. Maybe they aren’t as complicated as they should be, or maybe they are simply repeated over too many accounts. Passwords can be a hindrance to account security, but they can also be boons when created properly.

Let’s discuss how you can make strong, complex passwords.

Creating Strong Passwords

Be sure to keep the following practices in mind for creating strong passwords:

Don’t Repeat Your Passwords
It doesn’t matter how strong a password is when it’s your single line of defense for multiple different accounts. All it takes is one instance of a data breach to expose that password to hackers, leading to multiple accounts being vulnerable. You can increase your security substantially by simply using different complex passwords for each of your accounts.

Make Them Complex
What do we mean by complex passwords? It’s simple; they should be easy enough to remember, but difficult to guess. You can use a passphrase, for instance, using random words that you’ve put together. Throw some numbers and symbols in there too for good measure.

Never Include Personal Details
You shouldn’t include personal details in your passwords because depending on how much information you share publicly on social media, the information could be used against you. Remember, the password should be easy to remember, but difficult to guess, and if there is information about you known to the hacker, they can potentially guess the password.

Use a Password Manager
The average user has countless passwords that they use to secure their accounts, so keeping track of multiple, complex passwords is a tall order even for the most dedicated employee. A password manager can make it easier to keep track of them all, and for those who have trouble with recycling passwords, many of these managers have built-in password generators. A password manager works by securing multiple passwords in an encrypted vault protected by a master password, so instead of remembering multiple passwords, you just have to keep track of one.

Need a Hand with Cybersecurity?

White Mountain IT Services is happy to help you navigate the challenges associated with cybersecurity. To learn more about what we can do for your business, contact us today at 603-889-0800.

Related Posts

For a long time, businesses that didn’t have any cybersecurity problems would never consider investing in additional cybersecurity tools. The decision-makers of these companies simply didn’t find it necessary; and many of them had a point (until they...
While many small businesses shrug off cybersecurity needs as too expensive an investment for an organization of their size, this is a potentially catastrophic mistake. The fact of the matter is that small businesses are regularly targeted by cyberatt...
One of the big advantages that Mac computers have had over the traditional PC is that they “don’t get viruses,” but how true is this claim, really? Research conducted by Elastic Security Labs proves that this is certainly not the case, discrediting t...
We get it—nobody likes to think about the prospect of being impacted by a cybersecurity incident, but it’s like any other unpleasant event in that it is best to prepare for it. In fact, today’s businesses can invest in a cyber insurance policy to hel...
With so many threats out in the world, it’s no surprise that some of them target undiscovered vulnerabilities. These types of threats use what are called zero-day exploits to make attempts at your sensitive data and technology infrastructure. What is...
Remote work on a widespread scale was introduced in less-than-optimal circumstances, but that doesn’t mean that today’s businesses shouldn’t use it to their full advantage. Let’s discuss the situation at hand, more specifically, a few ways you and yo...
Let me ask you a question: how much did you pay Google for your Business Profile? Unfortunately, if the answer was anything other than “nothing,” you’ve been scammed. Google has actually announced that they are taking legal action against scammers wh...
If you become the victim of a hacking attack today, how would the hackers go about it? Would they try to find vulnerabilities in your network and infrastructure? You need to do what you can to answer the questions surrounding the strength of your exi...
Passwordless authentication has been increasingly spoken of in favor of the typical password-based method, and is gaining traction the more it is talked about. Google recently took steps toward passwordless that we felt warranted some discussion....
With countless threats out there waiting for IT professionals to slip up, it’s no small wonder that many of these professionals are opting into what is called a zero-trust policy for their security standards. So, what exactly is a zero-trust policy, ...
We aren’t going to try and pretend that the investments necessary to preserve your business’ data security are small ones. Especially at first glance, you may very well start to question if such an investment is truly necessary. The simple fact of th...
How many of your employees do you think hold a second job? This isn’t a particularly outlandish concept, but one thing that has come about as a result of the COVID-19 pandemic and its surge of remote work is that some employees hold two jobs at the s...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem NH and Portsmouth NH area.

White Mountain IT Services


33 Main St, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Client Help Desk      603-889-2210

New Client Inquiries   603-889-0800

Open Positions