Skip to main content


The New Language of Data Security: From Passwords to Passphrases

The Washington Post reports in this (8/11/16) video, "h15p@$$w0rd! is actually a worse password than thispasswordis,believeitornot. Find out why you shouldn't use symbols or caps in passwords, and what you should use instead. (Jhaan Elker/The Washington Post)"
The Washington Post reports in this (8/11/16) video, "h15p@$$w0rd! is actually a worse password than thispasswordis,believeitornot. Find out why you shouldn't use symbols or caps in passwords, and what you should use instead. (Jhaan Elker/The Washington Post)"
According to the Washington Post, “Now, a new standard is emerging for passwords, backed by a growing number of businesses and government agencies — to the relief of computer users everywhere. No longer must passwords be changed so often, or include an incomprehensible string of special characters. The new direction is one that champions less complexity in favor of length.”
The National Institute for Standards and Technology – the federal technology agency that works with industry to develop and apply technology, measurements, and standards – is advocating for longer passphrases - between 16 and 64 characters in length - over more complicated passwords, in its latest draft recommendations. Additionally, research is showing that changing passwords every 30 days as many companies do, just means individuals make minor tweaks to their password each month so they don’t have to remember a new one every time. This means the password may still be vulnerable to hacking.
So what does the difference between a password and passphrase look like?
Password:  @MeriC@1776
Passphrase: IThankTheFoundingFathersForThisAmericanDream
Hacker algorithms can try numerous variations of “America1776”, but they will have more difficulty cracking longer phrases. Confirming this, NIST Senior Adviser, Paul Grassi said, “Passphrases are much harder to crack and break, and much easier to remember.”
The passphrase is just one example of the solutions being introduced that go beyond passwords and make data security easier to manage. Another example is biometrics – and this is just the beginning of what we can expect to see in the next few years for new paradigms for security. Sinu continues to stay on top of the latest research and tests new password solutions for better data security for our customers while making it easier to manage.
Talk with your Sinu Relationship Manager about the best password security strategy for your organization and feel free to download one of our free white papers covering data security strategies.

Comments

Popular posts from this blog

In this chapter, we will see how to enable remote desktop application. It is important because this enables us to work remotely on the server. To do this, we have the following two options. For the first option, we have to follow the steps given below. Step 1  − Go to Start → right click “This PC” → Properties. Step 2  − On Left side click “Remote Setting”. Step 3  − Check radio button “Allow Remote connection to this computer” and Check box “Allow connection only from computers running Remote Desktop with Network Level Authentication (recommended)” → click “Select Users”. Step 4  − Click Add. Step 5  − Type user that you want to allow access. In my case, it is administrator → click OK. For the  second option , we need to follow the steps given below. Step 1  − Click on “Server Manage” → Local Server → click on “Enable” or Disable, if it is Disabled.
The table creation command requires: Name of the table Names of fields Definitions for each field Syntax: Here is generic SQL syntax to create a MySQL table: CREATE TABLE table_name ( column_name column_type ); Now, we will create following table in  TUTORIALS  database. tutorials_tbl ( tutorial_id INT NOT NULL AUTO_INCREMENT , tutorial_title VARCHAR ( 100 ) NOT NULL , tutorial_author VARCHAR ( 40 ) NOT NULL , submission_date DATE , PRIMARY KEY ( tutorial_id ) ); Here few items need explanation: Field Attribute  NOT NULL  is being used because we do not want this field to be NULL. So if user will try to create a record with NULL value, then MySQL will raise an error. Field Attribute  AUTO_INCREMENT  tells MySQL to go ahead and add the next available number to the id field. Keyword  PRIMARY KEY  is used to define a column as primary key. You can use multiple columns separated by comma to define...
The Windows Firewall with Advanced Security is a firewall that runs on the Windows Server 2012 and is turned on by default. The Firewall settings within Windows Server 2012 are managed from within the  Windows Firewall Microsoft Management Console . To set Firewall settings perform the following steps − Step 1  − Click on the Server Manager from the task bar → Click the Tools menu and select Windows Firewall with Advanced Security. Step 2  − To see the current configuration settings by selecting  Windows Firewall Properties  from the MMC. This  allows access to modify the settings  for each of the three firewall profiles, which are –  Domain, Private and Public  and IPsec settings. Step 3  − Applying custom rules, which will include the following two steps − Select either  Inbound Rules  or  Outbound Rules  under  Windows Firewall with Advanced Security  on the left side of the management console...