Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Tags: passwordsWorld Password DayCybercrimeManaged Security Servicessecuritycyber threatsData ProtectionRansomware
Author: Scott Gray
Date: April 29, 2024

Tips and tricks for improving your passwords, just in time for World Password Day.

Clifford Stoll, astronomer, author, and teacher, often joked about computer passwords. He said, “Treat your passwords like a toothbrush. Don’t let anybody else use it, and get a new one every six months.”

As I look back at my experiences with passwords, I remember back in the early ‘80s as a youth receiving my first ATM bank card.  The PIN for that card was the first computer-type password I can remember using.  It was a four-digit numeric PIN and I selected the very complicated password of “1, 2, 3, 4” thinking what a simple sequence it was to remember.  Yes, I know it was a bold and shrewd choice!  Fast forward nearly 40-plus years and I can no longer do the simplest online tasks without a password. Fortunately, I have been forced to move past these simple four-digit passwords to longer, more complex ones, but are they keeping up with the sophistication of today’s cyber threat landscape?

“Weak passwords are the most common way online criminals access accounts.” 

– cisa.gov/secureourworld

World Password Day, which falls on May 2nd this year, is aimed at promoting better password habits and cybersecurity awareness among computer users. This date serves as a reminder to evaluate and strengthen your passwords to keep your data away from hackers.  Stolen or compromised passwords often lead to cybercrime and identity theft.

Password Day is a great time to bring awareness to a variety of cyber threats, including ransomware and identity theft, that continue to increase exponentially year over year. I am sure most people think “Oh, this will never happen to me,” and ignore all the glaring risks of using common and repeated passwords.  Some people may keep the same password for months if not years.  Obviously, none of this behavior is good!

For organizations, Word Password Day is a wake-up call.  Matthew Parsons, Sr Director of product management at 11:11 Systems, explained “Whether we like it or not passwords are going to be a part of the IT world for some years to come, so it’s critical that organizations take the time to regularly review, update, and train around their corporate password policies.”  Parsons further said, “As one of the top exploited initial attack vectors, your password and authentication policies could mean the difference between a thwarted scare and full-blown ransomware!”

For individuals, Word Password Day should be a “call to action” to immediately change your passwords, especially the ones that you use every day.  This may include your emails, social media accounts, and most importantly, accounts that store your sensitive personal information like your online banking or credit card accounts.

Remember, not all passwords are created equal!  The table below, courtesy of Hive Systems, shows how quickly even perceived strong passwords can be attacked, and how simply making passwords longer, mixing upper- and lower-case letters, and using alphanumeric characters can immediately strengthen these critical passwords.

 

strong vs weak passwords

 

Bruce Schneier, a famous cryptographer and author, wisely said, “The whole notion of passwords is based on an oxymoron. The idea is to have a random string that is easy to remember. Unfortunately, if it’s easy to remember, it’s something nonrandom like ‘Susan.’ And if it’s random, like ‘r7U2*Qnp,’ then it’s not easy to remember.”

Think of your passwords as pieces of a jigsaw puzzle. Each character in the password is like a puzzle piece, and only when arranged correctly do they form the complete picture (grant access to your account). A strong password ensures that the pieces are complex and fit together securely.  Let’s look at some quick and easy ways to immediately bolster the everyday passwords that litter our digital footprints.

 

Tips and tricks for better passwords:

    1. Use Strong Passwords: Create passwords that are long, complex, and include a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using easily guessable information like birthdays or common words.
    2. Unique Passwords for Each Account: Avoid using the same password for multiple accounts. If one account gets compromised, it could lead to a domino effect of security breaches across multiple platforms.
    3. Consider Passphrases: Instead of a single complex password, consider using a passphrase consisting of multiple words. Passphrases can be easier to remember and more difficult for hackers to crack.
    4. Enable Two-Factor Authentication (2FA): Two-factor authentication adds an extra layer of security by requiring not only a password but also a secondary form of verification, such as a code sent to your phone. Enable 2FA whenever possible for your accounts.
    5. Use a Password Manager: Consider using a reputable password manager to securely store and manage your passwords. Password managers can generate strong, unique passwords for each account and automatically fill them in when needed.
    6. Regularly Update Passwords: Periodically update your passwords, especially for sensitive accounts like online banking or email. Set a reminder to change passwords every few months or after any security incident.
    7. Beware of Phishing Attempts: Be cautious of emails, messages, or websites that request your password or other sensitive information. Verify the legitimacy of requests before providing any personal data.
    8. Secure Your Devices: Ensure that your devices are protected with strong passwords, PINs, or biometric authentication methods. Keep your operating system, antivirus software, and apps up to date with the latest security patches.
    9. Educate Yourself: Stay informed about common cybersecurity threats and best practices for staying safe online. Regularly educate yourself and others in your household or workplace about the importance of strong passwords and cybersecurity health.
    10. Backup Your Data: Regularly back up your important data to a secure location, either locally or in the cloud. In the event of a security breach or data loss, having backups can help restore your information.

 

By following these tips and tricks, you can help improve your online security and protect your personal information from unauthorized access.  To learn more about data protection and other security tools please take a look at these 11:11 Systems resources.

    • How to Stay Out of the Headlines:  Protect Your IT Data From Ransomware
    • 11 Tips for Cyber Security Success: How to Fight Back Against Ransomware
    • Did You Leave Your Front Door Open?  Why cyberattacks surge using valid credentials
    • 11:11 Systems Data Protection Services
Category: CybercrimeBy Scott GrayApril 29, 2024
Tags: passwordsWorld Password DayCybercrimeManaged Security Servicessecuritycyber threatsData ProtectionRansomware

Author: Scott Gray

Scott Gray is a Product Marketing Manager at 11:11 Systems focused on managed security where he helps create product messaging and communications. As a "product guy" at heart, Scott has over 30 years of experience working in the IT and Consumer Electronics industries. Before joining 11:11 Systems Scott held roles at Compaq, Dell, HP, Panasonic, and Sharp in a variety of product management and product marketing roles. Scott graduated with a master's degree in International Business from Roosevelt University and also holds an undergraduate degree in Marketing from Oklahoma State University. Scott enjoys spending time with his family and is an avid sports fan.

Post navigation

PreviousPrevious post:Shawn Nelson on Mentoring the Next Generation of Women in TechNextNext post:Navigating VMware changes: How to minimize upheaval and keep your business moving forward (Webinar)

Related Posts

Cyber Resilience
Data Protection vs. Cyber Resilience: Mastering Both in the Complex World of Gambling
May 27, 2025
Cyber Resilience
Reimagining Cyber Resilience in the Gambling Industry: A Strategic Imperative for the Digital Age
May 13, 2025
effective passwords
Creating Effective Password Policies in Your Organization
May 5, 2025
World Password Day 2025
10 Tips for Strengthening Enterprise Security this World Password Day  
April 30, 2025
Passwordless World
Passwords, a Necessary Evil
March 19, 2025
cyber resilience
Lessons from Recent High-Profile Cyber Attacks
February 28, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top