Demos Support Blog
  • Products
    • SBS QMS Suite
    • Training Database
    • Ground Control
    • Quality Database
    • Asset Tracking Database
    • Vendor Management
    • FMEA Database
    • Q-Med Database
    • Inspection Database
    • T-Med Database
  • Solutions
    • Calibration Control
    • Cloud Based Solutions
    • Corrective And Preventive Actions
    • Document Control
    • Employee Training Management
    • Audit Management
    • Non-Conformance Tracking
    • Preventive Maintenance
    • Risk Management
    • Statistical Process Control
    • Supplier Management
  • Compliance
    • ISO 9001:2015
    • AS 9100
    • IATF 16949:2016
    • ISO 13485
    • API Q1
    • ISO 14001
    • ISO 45001 (OH&S)
  • Services
    • QMS Consulting
    • Customization
    • Database Solutions
    • Training Services
    • SBS Cloud QMS
  • News
    • New Product Release Summary
  • About Us
    • Contact Us
    • FAQ
    • Re-seller Program
    • TOS & Privacy
    • External Links
  • Home
  • Home
  • Products
  • Solutions
  • Compliance
  • Services
  • Contact Us
  • About Us
  • News
  • Blog
  • Cloud Migration for QMS Software Users
  • Microsoft Access Tips and Tricks
  • Self-Paced Training
  • 64-bit Product Upgrades
  • 64 bit Versions of Our Products
  • Cloud QMS Security
  • Avoid that annoying Microsoft Access Security Notice
  • PCI DSS Compliance
  • Cyber security: The Log4Shell hack
  • SBS Clinical Data Collection Tool helps get FDA approval
  • Data Security
  • SBS products and Windows 7 end of support
  • Document Control – Best Practices
  • SQL Server Benefits for QMS software
  • Office Defaults to 64-bit in 2019
  • General Data Protection Regulation (GDPR)
  • Tech Note: Deleting Demo Data
  • Managing risk using SBS software
  • Improve your QMS
  • Information Security, Electronic Records and Electronic Signatures in SBS Products
  • Training and T-Med Databases Compared
  • Selecting QMS Consultants
  • SBS software for ISO 9001:2015 compliance
  • Tech Note: SQL Based Software Solutions
  • Tech Note: Spell Checking Data
  • The SBS Quality Database for ISO 9001:2015
  • Tech Note: SBS Quality Database and Q-Med Compared
  • LinkedIn Hack results in passwords for sale
  • Secure Passwords
  • Asset Tracking Database Version 2.6 Released
  • What’s new in the Asset Tracking Database
  • Benefits of International Standards
Blog

Secure Passwords

Posted on May 9, 2016November 12, 2024Author AndrewCategories BlogTags Betty White F-bomb, create strong passwords, multi-factor authentication, Password manager, secure passwords, Secure your data in your Sunday Business Systems Database, use different passwords for each account, World Password Day

Secure Passwords

World Password Day is celebrated on the first Thursday of May each year to raise awareness about the importance of strong passwords.

Secure passwords are critical to preventing hacks,  protecting company information, and protecting personal information.  In a documentary interview, an infamous Romanian hacker said ” 123456 ” was often his first guess when trying to hack and account – and it all too often worked.

Your security is important.  Secure your data in your Sunday Business Systems Database by using strong passwords.

Check out some of the tips on the World Password Day site.  The videos from Betty White are funny – listen to her drop an F-bomb:

https://passwordday.org/

How do I create strong passwords?

The key to a strong password is length. Your passwords should be 8 characters long at the very least, and difficult for someone to guess. Avoid using personal information, especially if someone can find the answer on social media, or by searching your name online.

In addition to length, secure passwords also use a mix of uppercase, lowercase, numbers and symbols.

This may seem daunting but there is a simple solution. Try using a passphrase instead of a password. A pass phrase is a short saying that you modify to become a strong password. For example, “Thund3rSh0wersatSuns3t” would be a very strong password that’s also easy to remember.

Why use different passwords for each account?

Imagine if one key opened your front door, your car, your bank, and your safe. If someone got hold of your one key — poof — they have access to everything. That’s more or less your situation when you recycle passwords. If it’s someone has access to your one, key password, they have access to everything.

Cyber criminals know people reuse passwords, and after a major password leak, they’ll try using those passwords and email addresses to get into all kinds of sites. Often, it works.

Don’t get caught in this trap. The solution is simple: have different passwords for every online account. That way if one account is compromised you can rest easy knowing your other accounts are still safe.

If you think it would be difficult to remember all those passwords, move on to the next section for an easy solution.

Why get a password manager?

A good password manager safely stores all your passwords, remembers them and can generate strong passwords for you. This makes it incredibly easy to use different, hard-to-remember passwords for every account, so you only have to remember the one master password to get in. All the security – less hassle!

But what if someone gets your master password? Luckily, quality password managers have prepared for this by ensuring they only work on your registered devices. That way, if someone tries to log in from an unregistered device, the password manager will block access until the user completes a second, or third login step, like entering a secret code that is emailed or texted to you. If you get an email saying someone is trying to login from an unknown device, you’ll know you should change your master password as soon as possible.

In addition to emailed and texted codes, some password managers also let you add fingerprint, and face recognition options and devices you trust — this is called multi-factor authentication, and it offers convenient, powerful protection for your password vault.

What is multi-factor authentication and how do I use it?

How does multi-factor work?
If you’ve ever used a fingerprint reader on your phone, you’ve used multi-factor! For example, when you download an app from an app store, it first checks you’re on a trusted device (Factor 1) and then verifies you’re you with your fingerprint (Factor 2).

If you’re on a computer, usually it’s like this: when you enter your username and password, you’ll be asked for a verification code that will be texted to your phone. Pop in that single-use code, and you’re in. Ta-da! Multi-factor authentication!

Why should I use multi-factor?
Last year, 450 million passwords were leaked from major Internet companies. Adding an extra layer to your passwords significantly decreases the risk of someone accessing your account. Think of it like a second lock on your door, or a moat surrounding a castle.

What sites and services offer multi-factor?
You can activate multi-factor in the settings for most major websites. Our friends at twofactorauth.org have put together a comprehensive list of websites and services that offer MFA.

Source:  https://passwordday.org/

Categories

  • Blog
  • Compliance
  • News
  • Products
  • Screen Shots
  • Services
  • Solutions
  • Uncategorized

Pages

  • Home
  • About Us
  • Contact Us
  • Demos
  • External Links
  • Support
  • TOS & Privacy

Topics

API Q1 AS9100 asset management Asset Tracking Database Audit Management Calibration Calibration Software CAPA CAPA Software certification Corrective Actions Document control employee training history Employee training management Employee training plan enterprise quality management software eqms FMEA FMEA Risk management ISO 9001 ISO 9001 compliance software ISO 9001:2015 ISO 9001:2015 software ISO 13485 Learning Management System LMS manage employee training records new release Paperless QMS Preventive Actions Preventive Maintenance QMS QMS Software quality management system quality management systems Risk analysis Risk Based thinking Risk Management Sunday Business Systems Supplier management SWOT Analysis track employee roles and responsibilities Training Database training requirements TS16949
SALES DEPARTMENT
sales@sundaybizsys.com
TECHNICAL SUPPORT
support@sundaybizsys.com
PRODUCT FEEDBACK
feedback@sundaybizsys.com
MAIN PHONE NUMBER
(408) 217-9680
Our software is downloaded electronically. The box images are only for representation.