{"id":3773,"date":"2014-02-10T15:16:43","date_gmt":"2014-02-10T23:16:43","guid":{"rendered":"http:\/\/www.limetechsolutions.com\/?p=3288"},"modified":"2014-02-10T15:16:43","modified_gmt":"2014-02-10T23:16:43","slug":"smart-methods-for-password-creation","status":"publish","type":"post","link":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/","title":{"rendered":"Smart Methods for Password Creation"},"content":{"rendered":"<p>It&#8217;s challenging to come up with secure passwords that will protect your data from online crooks. The crooks are, in fact, becoming more and more savvy with each passing year.<\/p>\n<p>For the best protection, choose passwords that comply with high standards of protection. Here are some ways to help you create strong passwords you will actually remember.<\/p>\n<h3>Smart Methods for Password Creation:<\/h3>\n<ul>\n<li>Use at least 8 characters<\/li>\n<li>Do not include your name, address, phone number, birthday, family names, etc.<\/li>\n<li>Do not use any complete words<\/li>\n<li>Avoid consecutive numbers (ex. 1234) and double letters or numbers (ex. 55)<\/li>\n<li>Include at least one character from each of the following categories: upper case letters, lower case letters, numbers, and symbols (including spaces)<\/li>\n<li>Consider working from a phrase that is familiar to you, such as &#8220;I love Peanut Butter and Jelly Sandwiches,&#8221; but translating it into characters that fall within the categories above. For example: 4IluV, pb&amp;Js&amp;w. This will help the password be more memorable to you.<\/li>\n<li>Consider spelling your phrase backwards, and replacing certain letters with characters (for example, replace O with () or A with @)<\/li>\n<\/ul>\n<h3>Additional Tips:<\/h3>\n<ul>\n<li>Create a unique password for each login credential needed, ie. don&#8217;t recycle<\/li>\n<li>Change your passwords every six months<\/li>\n<li>Don&#8217;t write your passwords down &#8212; unless you&#8217;re keeping a copy in a safe somewhere<\/li>\n<li>Don&#8217;t use an online password generator &#8212; there is no way of guaranteeing their security<\/li>\n<\/ul>\n<h3><strong>Articles on smart methods for password creation:<\/strong><\/h3>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb\">Microsoft&#8217;s guidelines on creating a strong, secure password<\/a><\/p>\n<p><a title=\"Password guessers look for\" href=\"http:\/\/lifehacker.com\/5800346\/what-professional-password-guessers-look-for-in-your-password\">What password guessers look for<\/a><\/p>\n<p><a title=\"Worst passwords\" href=\"http:\/\/www.pcworld.com\/article\/2089244\/the-25-worst-passwords-of-2013-password-gets-dethroned.html\">25 worst passwords of 2013, according to PC Magazine<\/a><\/p>\n<p><em>LimeTech provides IT consulting services and technical support to startups, small businesses, and entrepreneurs in the San Francisco Bay Area and beyond. You can get in touch anytime for a free consultation with a LimeTech IT expert.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s challenging to come up with secure passwords that will protect your data from online crooks. The crooks are, in fact, becoming more and more savvy with each passing year&#8230;..<\/p>\n","protected":false},"author":2,"featured_media":10649,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[524,502,503],"tags":[513,508,584,540,535,576,519],"class_list":["post-3773","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-consulting","category-news-and-events","category-small-business","tag-email","tag-it","tag-passwords","tag-pc","tag-remote-work","tag-security","tag-small-businesses"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Smart Methods for Password Creation - Lime Tech<\/title>\n<meta name=\"description\" content=\"To protect your data, choose secure passwords that comply with high standards of protection. Here are some smart methods for password creation...\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smart Methods for Password Creation - Lime Tech\" \/>\n<meta property=\"og:description\" content=\"To protect your data, choose secure passwords that comply with high standards of protection. Here are some smart methods for password creation...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/\" \/>\n<meta property=\"og:site_name\" content=\"Lime Tech\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-10T23:16:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2014\/02\/Rectangle-Flat-Illustration1x-copy-14.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1104\" \/>\n\t<meta property=\"og:image:height\" content=\"886\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kerry Abukhalaf\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tjarb.com\/limetech\/#website\",\"url\":\"https:\/\/tjarb.com\/limetech\/\",\"name\":\"Lime Tech\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tjarb.com\/limetech\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2014\/02\/Rectangle-Flat-Illustration1x-copy-14.png\",\"contentUrl\":\"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2014\/02\/Rectangle-Flat-Illustration1x-copy-14.png\",\"width\":1104,\"height\":886},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#webpage\",\"url\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/\",\"name\":\"Smart Methods for Password Creation - Lime Tech\",\"isPartOf\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#primaryimage\"},\"datePublished\":\"2014-02-10T23:16:43+00:00\",\"dateModified\":\"2014-02-10T23:16:43+00:00\",\"author\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b\"},\"description\":\"To protect your data, choose secure passwords that comply with high standards of protection. Here are some smart methods for password creation...\",\"breadcrumb\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tjarb.com\/limetech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smart Methods for Password Creation\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b\",\"name\":\"Kerry Abukhalaf\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tjarb.com\/limetech\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g\",\"caption\":\"Kerry Abukhalaf\"},\"url\":\"https:\/\/tjarb.com\/limetech\/author\/kerry-abukhalaf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smart Methods for Password Creation - Lime Tech","description":"To protect your data, choose secure passwords that comply with high standards of protection. Here are some smart methods for password creation...","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Smart Methods for Password Creation - Lime Tech","og_description":"To protect your data, choose secure passwords that comply with high standards of protection. Here are some smart methods for password creation...","og_url":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/","og_site_name":"Lime Tech","article_published_time":"2014-02-10T23:16:43+00:00","og_image":[{"width":1104,"height":886,"url":"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2014\/02\/Rectangle-Flat-Illustration1x-copy-14.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kerry Abukhalaf","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/tjarb.com\/limetech\/#website","url":"https:\/\/tjarb.com\/limetech\/","name":"Lime Tech","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tjarb.com\/limetech\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#primaryimage","inLanguage":"en-US","url":"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2014\/02\/Rectangle-Flat-Illustration1x-copy-14.png","contentUrl":"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2014\/02\/Rectangle-Flat-Illustration1x-copy-14.png","width":1104,"height":886},{"@type":"WebPage","@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#webpage","url":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/","name":"Smart Methods for Password Creation - Lime Tech","isPartOf":{"@id":"https:\/\/tjarb.com\/limetech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#primaryimage"},"datePublished":"2014-02-10T23:16:43+00:00","dateModified":"2014-02-10T23:16:43+00:00","author":{"@id":"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b"},"description":"To protect your data, choose secure passwords that comply with high standards of protection. Here are some smart methods for password creation...","breadcrumb":{"@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/smart-methods-for-password-creation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tjarb.com\/limetech\/"},{"@type":"ListItem","position":2,"name":"Smart Methods for Password Creation"}]},{"@type":"Person","@id":"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b","name":"Kerry Abukhalaf","image":{"@type":"ImageObject","@id":"https:\/\/tjarb.com\/limetech\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g","caption":"Kerry Abukhalaf"},"url":"https:\/\/tjarb.com\/limetech\/author\/kerry-abukhalaf\/"}]}},"_links":{"self":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/posts\/3773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/comments?post=3773"}],"version-history":[{"count":0,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/posts\/3773\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/media\/10649"}],"wp:attachment":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/media?parent=3773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/categories?post=3773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/tags?post=3773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}