That long password isn’t keeping you better protected • Blisstech Solutions

How secure do you think your passwords are? Do you believe that longer is always better? Well, we have some news for you. It’s time for a serious talk about password security.

New research has revealed a sobering truth – even passwords that are 15 characters long can be compromised. Yes, you read that right. It’s time to face the stark reality… length doesn’t always mean strength.

The eight-character password reigns supreme as the most compromised length of the password. But don’t breathe a sigh of relief if yours is a longer one. The 15-character password also appears in the top ten most compromised lengths.

You might ask, “How could this be?” The answer lies not only in the password length but also in the content of the password and whether you use the same password on multiple sites.

The most compromised eight-character password is none other than “password” itself, while the most compromised 15-character password is “Sym_newhireOEIE”.

It doesn’t exactly feel secure, does it?

It’s not just about individual people. Businesses like yours are at high risk, too. An alarming 86% of all cyber attacks start with stolen credentials. That’s nearly nine out of ten attacks. Can you afford to be complacent?

Sure, longer passwords do offer more resistance to brute force cracking. An eight-character password can be cracked in five minutes, while a good 15-character one could take up to 37 million years if it does not follow any obvious pattern (i.e., it’s random and uses many characters). Impressive, isn’t it?

But remember, this is just one piece of the puzzle. Length alone won’t save you from stolen credentials via phishing attacks.

Use a robust business password manager. Not only will it randomly generate long passwords for you, but it will also remember them and fill in the login box for you.

You should also use two-factor authentication, generating a code on a separate device to prove it’s you. Even if cyber criminals crack your password, they won’t be able to access your data.

If you need help protecting your business better, get in touch.

More Content

It’s time to say goodbye to traditional passwords

Say goodbye to traditional passwords, say hello to Passkeys

Passwords could soon be a thing of the past, thanks to Passkeys. If you hate passwords, our latest tech update will make your day…

Windows 11 optional update: Why it’s better to wait  

Microsoft has just announced an option for people to trial new features before their general release in Windows 11.  This isn’t about fixes to security flaws – everyone gets those at the same time.   This is an opportunity for businesses to jump the queue to receive new features and updates first.  Sound exciting?   Yes!   Worth the risk?   Not quite.  Our …
Read More

Exciting new formatting tools for Notepad

Exciting new formatting tools for Notepad

There’s a quiet update on the way for Notepad that might make a big difference to how you take notes, prep for meetings, or share quick updates with your team. Simple, fast, and now, just a bit smarter…

Tech Tip: How to Share Large Files for Free with WeTransfer

Welcome to a new Tuesday tech tip video where I will show you how to transfer large files using WeTransfer. Do you ever have trouble sending large files through email? Email servers have size limits, so you can't just attach a big file and send it off. This can be a...
@ symbol with a hook through it

Anti-virus programs aren’t enough

Today, many business owners install an antivirus program as their single line of defence and call it a day. However, there are many ways to get into a network that circumvents anti-virus. Hackers are creating malware faster than anti-virus programs can recognise them...

Microsoft 365 makes Multi-Factor Authentication easier

Microsoft is planning to enable Multi-Factor Authentication (MFA) directly in its Outlook app for many 365 business users.

Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.

Tech Tip: How to use Pivot Tables in Excel

Welcome to Tuesday's Two Minute Tech Tip where Matt shows you how you can explore your Excel data using the power of Pivot Tables. Pivot Tables are a powerful feature of Excel that allows you to manipulate your flat Excel data to perform calculations and create charts...
1 in 4 people struggle with password overload. Here’s the answer

1 in 4 people struggle with password managment. Here’s the answer

Struggling from password overload? You’re not alone, and it’s putting your business at risk of data theft. Good news: There’s a very simple solution and we’ll tell you all about it.

Tech Tip: How to Tidy up Copied Data in Excel

This Tuesday Two Minute Tech-tip shows you how to tidy up data in Excel spreadsheets. Do you have data in a messy format and need to change it so it is organised? Have you ever received data in Excel or in a text file or Word document and wanted to change it from rows...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05