{"id":837,"date":"2020-10-08T13:57:38","date_gmt":"2020-10-08T18:57:38","guid":{"rendered":"https:\/\/www.is-t.net\/blog\/?p=837"},"modified":"2022-11-19T21:54:57","modified_gmt":"2022-11-20T02:54:57","slug":"importance-of-secure-passwords","status":"publish","type":"post","link":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/","title":{"rendered":"The Importance Of Using Secure Passwords"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"837\" class=\"elementor elementor-837\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-283f741 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"283f741\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9de774\" data-id=\"f9de774\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f865365 elementor-widget elementor-widget-text-editor\" data-id=\"f865365\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IT professionals and cybersecurity experts agree that one of the most important IT practices businesses should prioritize is the implementation of strong, unique passwords. However, businesses and employees continue to ignore this advice despite mounting evidence that weak passwords are a top cause of potentially devastating cybersecurity breaches. Users claim that it\u2019s difficult to remember strong, unique passwords and often get frustrated by system and software requirements to change passwords regularly.<\/p><p>Unfortunately, hackers and their advanced computer programs are adept at guessing passwords, meaning that the all-too-common practice of using weak passwords could leave your organization\u2019s data wildly unprotected even if you use antivirus software and other cybersecurity measures. Once access is gained to one device, intruders can quickly gain access to entire systems, causing data breaches, viruses, and system outages. In a world driven by technology, can your business afford the financial strain, client backlash, and systemic damage caused by a weak password?<\/p><p>Here, we\u2019ll discuss the dangers behind weak passwords, how to create stronger passwords, and other cybersecurity best practices to help keep your business safe. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-048340d elementor-widget elementor-widget-image\" data-id=\"048340d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg\" class=\"attachment-large size-large wp-image-841\" alt=\"importance of a strong password 1\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbc12b9 elementor-widget elementor-widget-heading\" data-id=\"cbc12b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Importance of a Strong Password\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a991df3 elementor-widget elementor-widget-text-editor\" data-id=\"a991df3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>How many devices do you own that require a password? From desktop computers, to tablets, to phones, to home security cameras, nearly everyone has a wide array of technology-based devices that they utilize passwords for. How many applications or websites do you use on a daily basis that require a password to login? Whether checking your work email, shopping online, or scrolling social media, most people enter passwords into multiple applications every single day. That said, it\u2019s essential for people to understand that any application, website, or device for which a password is used can serve as a gateway for hackers to gain access to your systems and any device that connects to the internet is sharing information. This means that a single weak password can grant hackers entry to the technology corridor that connects all of your devices, websites, systems, and applications. Think of it as a disease spreading from one part of the system to another \u2013 unless there\u2019s a clear barrier to stop the infection before it starts, things can get out of hand more quickly that you might realize.<\/p><p>That\u2019s why it\u2019s so important for users of any device or application to have strong, unique passwords for everything. Whether we\u2019re talking technology used at home or devices and applications for business use, simply using a strong password can be enough of a deterrent for a hacker to choose another target. Strong passwords are a free and easy way to protect your business\u2019s financial data, client information, and technology assets. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23d6428 elementor-widget elementor-widget-image\" data-id=\"23d6428\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/CrackYourPasswordImage-1024x1024.jpg\" class=\"attachment-large size-large wp-image-860\" alt=\"Time It takes to crack a password chart\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/CrackYourPasswordImage-1024x1024.jpg 1024w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/CrackYourPasswordImage-300x300.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/CrackYourPasswordImage-150x150.jpg 150w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/CrackYourPasswordImage-768x768.jpg 768w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/CrackYourPasswordImage.jpg 1300w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af5b279 elementor-widget elementor-widget-heading\" data-id=\"af5b279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Create a Strong Password\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-001c9e0 elementor-widget elementor-widget-text-editor\" data-id=\"001c9e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are specific best practices that every user should follow when creating their passwords to ensure they are unique and strong. These include:<\/p><ul><li>Passwords should be long and complex by having more than eleven characters and including a variety of different character combinations. <\/li><li>Passwords should include special characters such as commas, exclamation points, question marks, parentheses, asterisks, etc. <\/li><li>Password should include a combination of lower-case letters, upper-case letters, and numbers. <\/li><li>Password should be easy to remember but hard to guess. Users can do this by using a word or phrase that is meaningful to them and type it using alternating upper-case and lower-case letters as well as symbols. For example, if your chosen word is \u201cSecurity\u201d you might type it as \u201cS3cUr1tY!!\u201d You can also choose a phrase like \u201cHow are you doing today\u201d and type it using the first letter of each word in the phrase like \u201cHaYD2d4y!!\u201d<\/li><li>For devices with pin numbers or passcodes, avoid using common and guessable dates such as birthdays and anniversaries.<\/li><\/ul><p>Once you\u2019ve created your password, it\u2019s important to not write your password down or keep it in a digital document in any place that can be accessed by someone other than yourself. Many users choose to either keep their passwords written on a piece of paper in a locked and secure safe or within a proven secure application such as Dashlane. This helps to remember difficult passwords while also maintaining good security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1bbf3e elementor-widget elementor-widget-image\" data-id=\"d1bbf3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords2_IST.jpg\" class=\"attachment-large size-large wp-image-842\" alt=\"importance of a strong password 2\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords2_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords2_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords2_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3624373 elementor-widget elementor-widget-heading\" data-id=\"3624373\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Other Important Security Measures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0de838 elementor-widget elementor-widget-text-editor\" data-id=\"f0de838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Although having strong and unique passwords are an essential aspect of cybersecurity, there are additional steps that business owners should take to protect their devices and technology data. Some of these steps are:<\/p><ul><li>Never sharing passwords.<\/li><li>Not using the same password for multiple devices and applications.<\/li><li>Only providing information to websites that are encrypted. Check the web address for https at the beginning to ensure encryption.<\/li><li>Utilizing security software and updating it regularly.<\/li><li>Having an <a href=\"https:\/\/www.is-t.net\/\">IT consultation firm<\/a> assess your business\u2019s current state of cybersecurity and making suggested updates and changes as advised.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT professionals and cybersecurity experts agree that one of the most important IT practices businesses should prioritize is the implementation of strong, unique passwords. However, businesses and employees continue to ignore this advice despite mounting evidence that weak passwords are a top cause of potentially devastating cybersecurity breaches. Users claim that it\u2019s difficult to remember [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-837","post","type-post","status-publish","format-standard","hentry","category-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Secure Password Is Step 1 In Keeping Accounts Secure<\/title>\n<meta name=\"description\" content=\"A secure password is the first line of defense against unauthorized access to private information. IS&amp;T helps your business stay secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Secure Password Is Step 1 In Keeping Accounts Secure\" \/>\n<meta property=\"og:description\" content=\"A secure password is the first line of defense against unauthorized access to private information. IS&amp;T helps your business stay secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"IS&amp;T Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-08T18:57:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-20T02:54:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg\" \/>\n<meta name=\"author\" content=\"Scott Lard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Lard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/\"},\"author\":{\"name\":\"Scott Lard\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\"},\"headline\":\"The Importance Of Using Secure Passwords\",\"datePublished\":\"2020-10-08T18:57:38+00:00\",\"dateModified\":\"2022-11-20T02:54:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/\"},\"wordCount\":799,\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/TheImportanceofStrongPasswords1_IST.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/\",\"name\":\"A Secure Password Is Step 1 In Keeping Accounts Secure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/TheImportanceofStrongPasswords1_IST.jpg\",\"datePublished\":\"2020-10-08T18:57:38+00:00\",\"dateModified\":\"2022-11-20T02:54:57+00:00\",\"description\":\"A secure password is the first line of defense against unauthorized access to private information. IS&T helps your business stay secure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/TheImportanceofStrongPasswords1_IST.jpg\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/TheImportanceofStrongPasswords1_IST.jpg\",\"width\":800,\"height\":400,\"caption\":\"importance of a strong password 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/importance-of-secure-passwords\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Importance Of Using Secure Passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"name\":\"IS&amp;T Blog\",\"description\":\"News for nerds, stuff that matters\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\",\"name\":\"IS&T Consulting Group, LLC\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"width\":125,\"height\":47,\"caption\":\"IS&T Consulting Group, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\",\"name\":\"Scott Lard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"caption\":\"Scott Lard\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Secure Password Is Step 1 In Keeping Accounts Secure","description":"A secure password is the first line of defense against unauthorized access to private information. IS&T helps your business stay secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/","og_locale":"en_US","og_type":"article","og_title":"A Secure Password Is Step 1 In Keeping Accounts Secure","og_description":"A secure password is the first line of defense against unauthorized access to private information. IS&T helps your business stay secure.","og_url":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/","og_site_name":"IS&amp;T Blog","article_published_time":"2020-10-08T18:57:38+00:00","article_modified_time":"2022-11-20T02:54:57+00:00","og_image":[{"url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg","type":"","width":"","height":""}],"author":"Scott Lard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Lard","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/#article","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/"},"author":{"name":"Scott Lard","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa"},"headline":"The Importance Of Using Secure Passwords","datePublished":"2020-10-08T18:57:38+00:00","dateModified":"2022-11-20T02:54:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/"},"wordCount":799,"publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg","articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/","url":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/","name":"A Secure Password Is Step 1 In Keeping Accounts Secure","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/#primaryimage"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg","datePublished":"2020-10-08T18:57:38+00:00","dateModified":"2022-11-20T02:54:57+00:00","description":"A secure password is the first line of defense against unauthorized access to private information. IS&T helps your business stay secure.","breadcrumb":{"@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/#primaryimage","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/10\/TheImportanceofStrongPasswords1_IST.jpg","width":800,"height":400,"caption":"importance of a strong password 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.is-t.net\/blog\/importance-of-secure-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.is-t.net\/blog\/"},{"@type":"ListItem","position":2,"name":"The Importance Of Using Secure Passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.is-t.net\/blog\/#website","url":"https:\/\/www.is-t.net\/blog\/","name":"IS&amp;T Blog","description":"News for nerds, stuff that matters","publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.is-t.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.is-t.net\/blog\/#organization","name":"IS&T Consulting Group, LLC","url":"https:\/\/www.is-t.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","width":125,"height":47,"caption":"IS&T Consulting Group, LLC"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa","name":"Scott Lard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","caption":"Scott Lard"}}]}},"_links":{"self":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/comments?post=837"}],"version-history":[{"count":15,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/837\/revisions"}],"predecessor-version":[{"id":4288,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/837\/revisions\/4288"}],"wp:attachment":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media?parent=837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/categories?post=837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/tags?post=837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}