It’s Time to Stop Using Weak Passwords, Period

It’s Time to Stop Using Weak Passwords, Period

Simple passwords are often the bane of a business’ existence. If you routinely use strings like Password, 123456, Guest,  or Qwerty to secure an account, then you need to reexamine your password practices before they lead to a data breach. A good password can go a long way toward helping you in this effort.

In the case of the password, it’s often beneficial to know what not to do in addition to what you should do.

What Makes for a Bad Password?

Bad passwords are a little bit of a misnomer these days, especially as passwords are simply not the ideal way to protect important information anymore; rather, they should be a part of a multi-factor authentication solution. But alas, that’s not why we are here today. Passwords are still popular methods of protecting accounts, so we have to go over what makes them effective or ineffective.

Passwords are bad when they are not as secure as they need to be, which could be for a variety of reasons. Maybe they aren’t as complicated as they should be, or maybe they are simply repeated over too many accounts. Passwords can be a hindrance to account security, but they can also be boons when created properly.

Let’s discuss how you can make strong, complex passwords.

Creating Strong Passwords

Be sure to keep the following practices in mind for creating strong passwords:

Don’t Repeat Your Passwords
It doesn’t matter how strong a password is when it’s your single line of defense for multiple different accounts. All it takes is one instance of a data breach to expose that password to hackers, leading to multiple accounts being vulnerable. You can increase your security substantially by simply using different complex passwords for each of your accounts.

Make Them Complex
What do we mean by complex passwords? It’s simple; they should be easy enough to remember, but difficult to guess. You can use a passphrase, for instance, using random words that you’ve put together. Throw some numbers and symbols in there too for good measure.

Never Include Personal Details
You shouldn’t include personal details in your passwords because depending on how much information you share publicly on social media, the information could be used against you. Remember, the password should be easy to remember, but difficult to guess, and if there is information about you known to the hacker, they can potentially guess the password.

Use a Password Manager
The average user has countless passwords that they use to secure their accounts, so keeping track of multiple, complex passwords is a tall order even for the most dedicated employee. A password manager can make it easier to keep track of them all, and for those who have trouble with recycling passwords, many of these managers have built-in password generators. A password manager works by securing multiple passwords in an encrypted vault protected by a master password, so instead of remembering multiple passwords, you just have to keep track of one.

Need a Hand with Cybersecurity?

White Mountain IT Services is happy to help you navigate the challenges associated with cybersecurity. To learn more about what we can do for your business, contact us today at 603-889-0800.

Related Posts

Information technology is a constantly changing industry, with practices shifting all the time. As a result, anyone you have working on your company’s IT should be actively seeking out various certifications to confirm that they are keeping up on mod...
While it is important that your business implement comprehensive network protections, there are plenty of simple ways that your business’ cybersecurity could potentially fail. This could easily cost you heavily in your available capital, financial an...
So, at this point, we’ve talked about what productivity is, how it can be measured, and how to protect it from what could potentially impact it negatively. To bring this brief series to a close, let’s talk about the things you can do to maximize it a...
Businesses cannot afford to grow complacent with their network security, as it could make a significant difference between falling prey to an attack and remaining secure. The process of securing a network must be looked at holistically, from top to b...

One major aspect of your business’ security is how well your team is trained to preserve it. Let’s go over some of the aspects that you need to be sure you address as you educate your team.

We’ve been spending the past few weeks examining productivity and how to optimize it, and today, we felt it was necessary to address the issues that could throw the proverbial wrench into the works.  Don’t worry, though, we’re also going to touc...
With so many threats in business, it doesn’t take much to fall victim to a cyberattack or a scam. Understanding the dangers out there is the first step in enacting a cybersecurity process that can keep your users and your business safe. Let’s take a ...
One of the reasons that information technology keeps changing is for the sake of the user and their convenience using it. However, if this convenience comes at the sacrifice of your business’ cybersecurity, it just isn’t worth it. This is the crux of...
Recently, we talked about productivity, and how it can be defined. We wanted to continue our deep dive into the concept of productivity with an examination of the different ways that you can measure your own. So, how can you keep track of your produc...
Ransomware is one of the worst situations that any business could have to deal with. It not only holds your data or computing infrastructure for ransom, it also creates situations where you have to explain to your clientele that you’ve been breached ...
Productivity has been, is now, and likely will forever be heralded as one of the preeminent goals for any business. As such, it makes sense to understand as much as we can about it. To do so, we’ll be examining a different aspect of productivity for ...
Back in 1995, the Association of Records Managers and Administrators were in the midst of campaigning for the renewal of the Paperwork Reduction Act. As a part of their efforts, they created National Records and Information Management Day. Over the y...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem NH and Portsmouth NH area.

White Mountain IT Services


33 Main St, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Client Help Desk      603-889-2210

New Client Inquiries   603-889-0800

Open Positions