Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

We’ve All Been There!

If a program mandates you to change your password, what do you do? You change it of course, but how much do you actually differ your previous password from your new one? If you’re like the majority of all computer users, chances are you change a single number. Remembering passwords is difficult, which understandably results in 66% of surveyed Americans admitting to using and repeating weak passwords such as “abc123” or “QWERTY”. 

So how can we combat our forgetfulness? Certainly not writing our passwords down and leaving them in your desk. Tooling has been developed to aid users in not only remembering passwords but making them better. Password managers, like the one from Google, are built into Google accounts as well as the Chrome browser. Not only does this eliminate the need for repetitive, unsophisticated passwords, it also makes them easier to enter. 

Unfortunately, the team at Google has noticed that despite the convenience offered with these applications, it simply was not motivating users to use more complex passwords. As a result, Password Checkup was developed. 

What Does Password Checkup Do?

Password Checkup examines the passwords that it has saved in your Google Account, and confidentially analyzes them. The examination process identifies bad password practices, such as: 

  • Security Breach Involvement - Your passwords are cross examined with known third-party breaches. 
  • Password Reuse - Nobody is perfect, we’ve all done it. However, there is no longer an excuse to reuse the same password over and over again, across multiple accounts. Tools are available to prevent headaches previously associated with complex, intricate passwords. 
  • Insufficient password strength - Password Checkup easily identifies the all too common trait of passwords -- lack of complexity. Cybercriminals’ tooling is evolving in a way that these weak passwords are no longer able to secure your account. This is why some programs mandate special characters, or capitalization. Some even rate your password strength as you enter it and mandate a minimum level of strength. 

Google now has the ability to inform users of their horrendous password practices they continue to practice every day.  

This extension has been available in the Chrome Web Store as of February 2019. Due to the importance of users locking down their personal security, this extension has been directly integrated into Chrome and Google accounts. 

It can be used by going to while logged into your Google account!

Now Is the Time - Improve Your Passwords!

You no longer have an excuse, it’s time to step up your security. Consider using the following tips to increase your password strength and remember not to use the same password everywhere. 

Step #1: Consider Using Passphrases!

Passphrases are a simple yet effective way to step-up your password strength. Not only is using a passphrase more effective, it is also easier for a user to remember. This is due to the personalization associated with a passphrase. Rather than trying to remember randomized letters or numbers, or sacrificing security for memorability, use a passphrase! 

Let’s say for example you like Shakespeare and love the phrase “To be or not to be”. This phrase would be a great foundation for a password. 

Example: ToBeOrNotToBe

Step #2: Switch Out Some Characters!

Alright Romeo, it’s time to further enhance your security. This simple complexity trick is easy to remember as a result of the similarity you can incorporate with the characters you choose. For example, let’s modify our previous passphrase into something a bit more secure.

Example: 2B0rN0t2B

Step #3: Add Some Additional Details!

That password comes up a little short, so adding further details will inherently improve your password’s security.  Add more memorable text to your password to ensure your password is at the maximum-security level. 

Example: Jul13T2B0rN0t2B!?

Remember, don’t use this for multiple applications. That is poor password practice. Instead, if you are a Shakespeare enthusiast, use a quote from a different play and turn it into a complex, secure passphrase! 

This might seem like it might be frustrating to re-enter constantly but remember… password management tools are here to help. So are we! Telesys Voice and Data can help you procure password management tools to eliminate bad password practices in the workplace. Call (800) 588-4430 today to learn more! 


No comments yet
Already Registered? Login Here
Tuesday, 10 December 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Computer Windows 10 Managed Service Provider Data Backup Productivity Ransomware Backup Innovation Outsourced IT Business Continuity Mobile Devices Android Hardware Smartphone Google Managed IT services Social Media Upgrade Data Recovery Efficiency User Tips Disaster Recovery Data Browser Communication IT Support Workplace Tips Small Business Managed IT Services Business Management Cloud Computing IT Support Smartphones App Data Management Microsoft Office Server Office Remote Monitoring Miscellaneous Internet of Things Holiday Phishing Network communications Password Paperless Office Office 365 Windows WiFi Facebook Encryption Save Money Tech Term Artificial Intelligence VoIP Gmail Big Data Spam Cybersecurity Passwords Apps Hosted Solution Apple Recovery Robot Employer-Employee Relationship Risk Management Saving Money Windows 10 Collaboration Bandwidth Document Management Firewall Customer Relationship Management Unified Threat Management Avoiding Downtime Downtime Wi-Fi Office Tips How To Customer Service Mobile Device Management Government Money Operating System Analytics Infrastructure Managed IT Work/Life Balance Remote Computing Compliance Word Hacker Tip of the week Vendor Management Chrome Content Filtering Health Data storage Social Computing Website Hacking IT Management Mobile Computing Tech Support Mobile Device Virtual Reality Antivirus Redundancy Training Two-factor Authentication SaaS Settings Project Management Data loss BYOD BDR Business Technology The Internet of Things Computers Presentation Business Growth Healthcare Telephone Systems Managed Service File Sharing Outlook Education Vulnerability Automation Applications Cybercrime Windows 7 Help Desk Going Green Alert Data Security Printing Virtual Private Network Wireless Technology Business Owner Samsung Mobile Security Wireless Consultation Digital Payment Meetings Marketing Maintenance Storage Computer Care YouTube Unified Communications Competition Access Control LiFi Information Technology Tablet Laptops Humor Upgrades Automobile Budget Analyitcs End of Support Augmented Reality Mouse IBM Running Cable Legal Specifications Display Regulations Bring Your Own Device Search Solid State Drive Twitter Sports Patch Management Monitors Scam IT service Identity Theft Politics Travel Cortana User Virtualization Net Neutrality Google Drive Administration Proactive Websites Physical Security Smart Technology Retail VPN Taxes HIPAA IT solutions Software as a Service Safety Assessment Best Practice Remote Monitoring and Management Botnet Licensing Router Lithium-ion battery Server Management data services IT Consultant Enterprise Resource Planning Employees IT Technicians Social Engineering Technology Tips Techology WPA3 Machine Learning Gadgets Software Tips Mobile VoIP Modem Computer Repair Bitcoin Managed IT Service Experience Statistics User Error Mail Merge Cleaning Mobile Notifications Zero-Day Threat Hotspot Mirgation Comparison Disaster Resistance PowerPoint Fleet Tracking Relocation Proactive Maintenance Webcam Cookies Electronic Medical Records Windows 8 Break Fix Google Wallet Bluetooth Printer Address Domains Consumers Corporate Profile Company Culture Crowdsourcing Backup and Disaster Recovery Language Dark Data Migration Black Friday Proactive IT 5G Quick Tips Entrepreneur Asset Tracking Private Cloud Processor History Point of Sale Nanotechnology Dark Web Drones Application Public Speaking WannaCry Vulnerabilities RMM Computing Infrastructure Users Chatbots Cyber Monday IT Consulting eWaste Time Management Remote Workers Error Cabling IT Sevices IoT Data Warehousing Mobility SharePoint Staffing Geography Procurement Alerts Identity flu season Data Breach Environment Network Management Information Active Directory Hard Drives Web Server Utility Computing Update Microsoft Excel Laptop Virtual Desktop Downloads VoIP GPS Cables Remote Worker Cooperation 3D Printing Fort Worth Technology Laws Troubleshooting Touchscreen Google Maps Monitoring Administrator Windows Server Refrigeration Disaster Cameras Chromebook Blockchain Halloween Multi-Factor Security Lenovo Digital Tracking Wires Law Enforcement Professional Services Staff Network Congestion User Management Unsupported Software Deep Learning flu shot Unified Threat Management Fun Phone System Electronic Health Records Uninterrupted Power Supply CCTV Cost Management Emoji Cyberattacks Permissions Scary Stories Shortcut Google Calendar Superfish Spyware Gadget Virtual Assistant Flexibility Batteries Mobile Data Fort Worth IT Hacks business communications systems Undo Hard Drive Bookmarks Fraud Legislation IP Address How To MSP Voice over Internet Protocol Operations Remote Work Social Networking Alt Codes DFW IT Service Current Events Internet Protocol Heating/Cooling Hard Disk Drive G Suite Recycling Processors Favorites Wearable Technology Networking Mobile Office Firefox Supercomputer Motion Sickness File Management Motherboard Typing VoIP streamlines iPhone Servers Management Conferencing Internet Exlporer Google Docs Buisness Writing IT Budget Manufacturing Telephone Personal Information Cryptocurrency Distributed Denial of Service business network infrastructure Knowledge

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...