• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

aSKaVIE

Your Tech Concierge™

  • Not tech savvy?
  • Room Service
    • 10-Ingredient Cocktail
    • New Installs
    • AI
  • aSKaVIE
    • Troubleshooter
    • Q&A
    • Training
    • Anchor Archives
    • tECH tALKtIPS
  • Boutique
    • Anti-Virus
    • Backup
    • Digital Imaging
    • Hardware
    • Hardware – Pre-Owned
    • Software
    • Other
    • aVIEzON-2024
    • Personal Computer Driver’s License
  • Contact
    • Testimonials
    • Privacy Policy
  • Payment

“Open Sesame!”

April 13, 2014 By Avie Uniglicht

“Open Sesame!” What is your password strategy?

Do you use sticky notes, scraps of paper,  a word processor or spreadsheet to document your passwords?  Or, do you just use the SAME password every time/ every place just so you can remember it or worse yet, use a common word or phrase that can easily be guessed or “cracked” in seconds?  Our digital world is routinely just a password away from being accessible to those who have the “key”.  Even with strong encryption, a password that can easily be discovered will render your secure storage space an open book.  So, what password strategy might we put in place that could work for us – both to make it easy enough, yet strong enough to actually serve a protective purpose?  Some ground rules are in order here.

First, research has proven that the length of a password (i.e. the more characters used no matter what the composition of those characters is to create the password) is superior to a shorter password with random and varied characters.  This leads us to the conclusion that a longer phrase is better than a single word.  The length makes it more difficult for automated password crackers to “hack”.  Statistically, the number of possibilities for each character times the number of characters in the password makes the odds of discovery much lower as the length of the password grows.  So, Rule #1:  Increase the length of your password to make it stronger.

Second, avoid commonly used passwords – those that we might use that are easily remembered such as “123456,” “password” and “12345678.” Adding a “1” to a common password is also a frequent practice when an alpha-numeric password is required.

So, Rule #2: Avoid common passwords, proper nouns, and any word found in a standard dictionary.

Third, once we create a “strong” password, we commit it to memory, then, we make the mistake of using it EVERYWHERE and we NEVER change it.  The challenge with this is that if it gets hacked, it becomes the first password that is attempted at every popular website where you may have an account.  Remember, a hacker just loves to gain access to your e-mail account.  Why?  Because most password reset processes routinely use your e-Mail account to send you a link to do so.  If the hacker has access to your e-mail account, it is very likely your e-mail address will not only be used for SPAM, but to gain access through password reset requests to your other more sensitive accounts where financial data may be stored. So, Rule #3: Use a different unique password for each of your digital accounts, never duplicate it, AND change your passwords on a regular basis so that you don’t give a hacker UNLIMITED chances to break yours.

Fine!  Now you’ve read all this and now say: “How in the world am I going to keep track of all these passwords?  The whole reason I’ve been doing it the way I am is that I just have no way of securely remembering multiple, strong passwords and I don’t even know how to quickly create a STRONG password”   “H E L P!”

Password creation and management has become much easier with the use of software that not only handles the secure encrypted storage, but also allows you to access and use your stored passwords to automatically login to websites and programs on each of your protected devices. These programs allow you to create and remember just one strong master password that then gives you access to the encrypted vault of all your stored passwords.  The software works on multiple platforms including Windows, Mac, iOS, and Android and even encrypts and syncs your passwords to a cloud storage site so that all of your devices have immediate access to your most currently added password.  One popular program that does all of this is called “Roboform”.

Other options include

To learn more about Roboform,  why I recommend it, and to get a Free Trial, visit my Backup page and look for the Roboform Banner there:  https://www.askavie.com/boutique/backup/

This is 7th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Primary Sidebar

aSKaVIE’s Remote Room Service™

Your Tech Concierge

tECHtALK tIP Newsletter

Thank you for subscribing to my aSKaVIE’s Silver Platter™. I value you and your time and promise not to overwhelm you with frequent contact. On occasion, I will share some information with you which includes our latest tech news and special offers only available to my Silver Platter™ VIP's.

 

Select list(s) to subscribe to


By submitting this form, you are consenting to receive marketing emails from: aSKaVIE. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Thank you so much Avie, you’ve always helped me tremendously. I’ve worked on computers all through my 47 years service to the oil industry, but you’re still teaching me things I never knew. You’re the BEST!!!! — Marsha

Ok Seriously! Avie Uniglicht just save me $500 on upgrading my Mac! If anyone has computer problems or questions…Avie is the expert! You must friend him! Now!

Best in the country and truly fixed in minutes! Thank -you again for your awesome quick service…He’s the best people don’t mess with the rest!

hello all my fb friends…I want to share with you an amazing experience I just had. Was having problems with internet connection (so I thought) and contacted Comcast… we all know what a joy calling them is… of course no help there so I reached out to someone I met through FB, Avie Uniglicht of […]

Hi Karen, He is in PA and I am in FL – He works remotely and takes control of your computer by way of a pass code that you approve. he can only do it with your approval. I’ve known him since 5th grade and I trust him completely. He made my computers so good […]

Recent Posts

  • “Windows Users – Time for a Tune-Up?”
  • So you want to Broadcast?
  • Protect your Credit and Identity
  • The File Cabinet
  • “Can I Trust That Connection?”
  • Boutique
  • Contact
  • Room Service
  • Testimonials
  • Privacy Policy

Copyright © 2025