Keeping Passwords Secure

As the web has evolved, so have the methods of collecting personal information. A large number of websites require visitors to register to gain access or participate. While the need for registration is understandable, tracking user names and passwords can be burdensome. Consider using software to store your passwords, in a safe accessible manner.

Most websites have privacy policies, but the value of privacy statements are only as honorable as the people behind the websites. Here are suggestions for keeping passwords and your information secure:

  • change your password frequently

  • never share your password with anyone

  • try to choose a password so it doesn't need to be written down, but not so obvious others would easily guess the password

  • be sure your password is at least 6 characters

  • don't use a password containing all the same characters

  • don't send your password via email or provide it over the phone

  • don't use pet, family or friend names

  • don't use your telephone number, zip code or address

  • use a different password for each account

  • don't use user name

  • deactivate accounts for terminated employees

  • don't allow shared accounts

  • password contains upper, lowercase letters, non-letter characters and numbers

    Resources

    Password Software - http://www.password-software.com

    Passwords are not foolproof. Do not rely on a password alone to protect sensitive information. Monitor accounts closely to ensure that security is not breached.

    About The Author

    Sharon Housley manages marketing for NotePage, Inc. http://www.notepage.net a company specializing in alphanumeric paging, SMS and wireless messaging software solutions. Other sites by Sharon can be found at http://www.softwaremarketingresource.com , and http://www.small-business-software.net

    In The News:


  • pen paper and inkwell


    cat break through


    Selecting a Personal Digital Assistant

    A Computer in Your HandCarrying around an address book and... Read More

    Keeping the Windows Registry Operational

    The registry is where the computer stores information about the... Read More

    Lives With Games Tradition and Industry

    The United States Of America citizen feels that games is... Read More

    Passwords and the Human Factor

    Passwords have a strange dual nature. The stronger and safer... Read More

    How to Save an Image in a SQL Server Database?

    Most of the web applications have a lot of images... Read More

    Getting Started with HTML

    The basic language of the internet is html. If you... Read More

    Selecting the Perfect Big Screen TV

    Selecting a TV isn't as easy as it used to... Read More

    The Newbies Guide to Personal Computer Maintenance

    When you turn on your computer, does it act like... Read More

    Have You Invited A Spy Into Your Computer?

    Yes, it's true. You may have inadvertently invited a spy... Read More

    Deleting and Destroying Data Forever

    Peoples' private information needs to stay private, even after it... Read More

    404 Error Pages: What Are They And How Do You Create One?

    We've all seen them, you've been browsing a website and... Read More

    Refurbished Computers on the Internet

    What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More

    Buying A PC Flat Screen Monitor

    For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More

    How To Speed Up Your Aging PC And Make It Healthier Too

    With a little tweaking and with proper tools, you can... Read More

    Windows Task Manager in English

    You use Ctrl+Alt+Del to see what's running on your PC,... Read More

    Help, I Need a New HDTV! (Part 4 of 5)

    Feeling overwhelmed in selecting a new TV? With all the... Read More

    Home Video? Bring it On

    So you got yourself a digital camcorder. If you want... Read More

    Bios Term

    BIOS - Basic Input Output SystemThe central processing unit of... Read More

    Does Microsoft Show Hackers How To Attack?

    After another security hole recently surfaced in Microsoft's Windows operating... Read More

    Web Standards

    HTTP ProtocolThe web is run on port 80. You are... Read More

    How To Have Two (Multiple) Copies Of Windows

    Having two operating systems is not as difficult as many... Read More

    FTP - File Transfer Protocol Explained

    File Transfer Protocol (FTP) is a protocol that is part... Read More

    Virtual Memory - What is It?

    I recently got an e-mail asking about virtual memory. The... Read More

    4 Computer Money-saving Tips

    Tip #1 -- Rebates: A rebate is not always a... Read More

    Bluetooth Headphones For Your PDA

    Nothing is worse than having to negotiate all kinds of... Read More

    5 Minute Guide to Video Editing for Beginners

    Getting started with video editing is very simple you only... Read More

    Lightning Season: How to Avoid Data Loss

    We have just entered the time of year that most... Read More

    How to Switch to Firefox and Why You should

    First things first, what is Firefox? Well, it's a browser.... Read More

    Bluetooth Technology: Tips for Buying Headsets or Headphones

    The technological horizon has always got something new to offer,... Read More

    The Importance Of Email Backup

    Viruses, software failures, power failures, human errors, hard drive failures... Read More

    Compile .BAT Files into Native Windows Applications (.EXE)

    Since the DOS days, batch files have been one of... Read More

    Setting File Permissions On A Unix Server

    File permissions are one of the strengths that the Unix... Read More

    CCNA 640-801 Certification Primer

    The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More