Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

We’ve All Been There!

If a program mandates you to change your password, what do you do? You change it of course, but how much do you actually differ your previous password from your new one? If you’re like the majority of all computer users, chances are you change a single number. Remembering passwords is difficult, which understandably results in 66% of surveyed Americans admitting to using and repeating weak passwords such as “abc123” or “QWERTY”. 

So how can we combat our forgetfulness? Certainly not writing our passwords down and leaving them in your desk. Tooling has been developed to aid users in not only remembering passwords but making them better. Password managers, like the one from Google, are built into Google accounts as well as the Chrome browser. Not only does this eliminate the need for repetitive, unsophisticated passwords, it also makes them easier to enter. 

Unfortunately, the team at Google has noticed that despite the convenience offered with these applications, it simply was not motivating users to use more complex passwords. As a result, Password Checkup was developed. 

What Does Password Checkup Do?

Password Checkup examines the passwords that it has saved in your Google Account, and confidentially analyzes them. The examination process identifies bad password practices, such as: 

  • Security Breach Involvement - Your passwords are cross examined with known third-party breaches. 
  • Password Reuse - Nobody is perfect, we’ve all done it. However, there is no longer an excuse to reuse the same password over and over again, across multiple accounts. Tools are available to prevent headaches previously associated with complex, intricate passwords. 
  • Insufficient password strength - Password Checkup easily identifies the all too common trait of passwords -- lack of complexity. Cybercriminals’ tooling is evolving in a way that these weak passwords are no longer able to secure your account. This is why some programs mandate special characters, or capitalization. Some even rate your password strength as you enter it and mandate a minimum level of strength. 

Google now has the ability to inform users of their horrendous password practices they continue to practice every day.  

This extension has been available in the Chrome Web Store as of February 2019. Due to the importance of users locking down their personal security, this extension has been directly integrated into Chrome and Google accounts. 

It can be used by going to while logged into your Google account!

Now Is the Time - Improve Your Passwords!

You no longer have an excuse, it’s time to step up your security. Consider using the following tips to increase your password strength and remember not to use the same password everywhere. 

Step #1: Consider Using Passphrases!

Passphrases are a simple yet effective way to step-up your password strength. Not only is using a passphrase more effective, it is also easier for a user to remember. This is due to the personalization associated with a passphrase. Rather than trying to remember randomized letters or numbers, or sacrificing security for memorability, use a passphrase! 

Let’s say for example you like Shakespeare and love the phrase “To be or not to be”. This phrase would be a great foundation for a password. 

Example: ToBeOrNotToBe

Step #2: Switch Out Some Characters!

Alright Romeo, it’s time to further enhance your security. This simple complexity trick is easy to remember as a result of the similarity you can incorporate with the characters you choose. For example, let’s modify our previous passphrase into something a bit more secure.

Example: 2B0rN0t2B

Step #3: Add Some Additional Details!

That password comes up a little short, so adding further details will inherently improve your password’s security.  Add more memorable text to your password to ensure your password is at the maximum-security level. 

Example: Jul13T2B0rN0t2B!?

Remember, don’t use this for multiple applications. That is poor password practice. Instead, if you are a Shakespeare enthusiast, use a quote from a different play and turn it into a complex, secure passphrase! 

This might seem like it might be frustrating to re-enter constantly but remember… password management tools are here to help. So are we! Central Technology Solutions can help you procure password management tools to eliminate bad password practices in the workplace. Call 1-844-237-4300 today to learn more! 

Tip of the Week: Managing Your IT Inventory Manage...
Getting Your iMessages on Windows 10


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Email Network Security IT Services Data Privacy Data Backup Malware Internet Hackers Software Outsourced IT Productivity Innovation Managed IT Services Computer Microsoft Data Recovery Business IT Support Hardware IT Support Efficiency Ransomware Mobile Devices User Tips Tech Term Google Upgrade Business Continuity Backup Small Business Cloud Computing Internet of Things Communication Windows 10 Phishing Collaboration Managed Service Provider Cybersecurity Managed IT Services Paperless Office Remote Monitoring Disaster Recovery VoIP Business Management Smartphone Workplace Tips Android Smartphones Encryption Managed IT Managed Service Save Money Artificial Intelligence Social Media Data Management Windows 10 Windows communications Browser Server Mobile Device Office 365 Facebook Saving Money BDR Help Desk Risk Management BYOD Passwords Password Automation Mobile Device Management Business Technology Wi-Fi Apps Miscellaneous Holiday Government Quick Tips App Document Management Big Data Network Employer-Employee Relationship Recovery Analytics Virtualization Chrome Firewall Training Avoiding Downtime Bandwidth Compliance Robot Laptops Bring Your Own Device Applications Gmail Going Green Vendor Management Unified Threat Management Healthcare Microsoft Office Infrastructure Data loss Vulnerability Blockchain Information Hosted Solution Apple Website Processor Windows 7 File Sharing Money IT Management Data storage Telephone Systems Content Filtering SaaS Redundancy Tip of the week Scam Wireless Antivirus Project Management Work/Life Balance Storage VPN Unified Communications Remote Computing Users Customer Relationship Management Settings Data Security Downtime Access Control Customer Service Social Machine Learning Mobility Virtual Reality Tablet RMM Computing Files Regulations Office IT Service Information Technology Operating System Router Printing Two-factor Authentication Politics Computers Gadgets Digital Payment Remote Monitoring and Management Outlook Maintenance Management Mouse Smart Technology Networking Net Neutrality Patch Management Websites Identity Theft Google Drive Licensing How To Samsung Remote Workers Spam File Management Virtual Private Network Chromebook WiFi Network Management Internet Exlporer Flexibility Hard Drive YouTube Business Growth IoT HIPAA Assessment Server Management Mobile Computing Cooperation How To Administration Mobile Security OneDrive Hacker Solid State Drive Upgrades Monitoring LiFi Uninterrupted Power Supply Employees Education Consultation Wireless Technology Legal Twitter Professional Services Current Events Company Culture IT solutions Recycling Utility Computing Word Search Display Dark Web End of Support Health Proactive Sports Budget Private Cloud Bitcoin The Internet of Things Software as a Service Tech Support Monitors Alert Employee-Employer Relationship Electronic Medical Records Social Engineering USB Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Solid State Drives Technology Assurance Group ’s 18 Wires Human Error Time Management Return on Investment Windows 8 Save Time Cybercrime Mobile Data Cost Management E-Commerce WannaCry Teamwork Technology Tips Chatbots Database Management Identities Microsoft Excel Modem Sync Connectivity Hacking Database Sensors Multi-Factor Security Wearable Technology Telephony Vulnerabilities Authentication Annual Convention Public Cloud Safety WPA3 Financial Servers Data Breach Notes Printer Alerts Law Enforcement Dark Data Personal Information Enterprise Resource Planning Bookmarks Options Distributed Denial of Service Permission Active Directory Travel Features Shared resources Google Wallet Comparison Identity Botnet GDPR Hard Drives Google Docs Cookies Mobile Device Managment Software Tips Notifications Disaster Trending Voice over Internet Protocol Payment Cards Google Calendar Geography Authorization Managed IT Service San Diego Automobile Computer Care Black Market Fleet Tracking Procurement Technology Laws PowerPoint Value of Managed Services Humor Gadget Mobile Favorites Mail Merge 5G Writing Emoji Test Touchscreen Techology Windows Server Backups Cache Electronic Health Records VoIP Sponsor Drones Specifications Lenovo Permissions Nanotechnology Star Wars Deep Learning Telephone Legislation IT Technicians GPS Network Congestion High-Speed Internet Break Fix Social Networking Asset Tracking Statistics Managed Services SharePoint Staff Computer Repair Conferencing Virtual Desktop Address Wireless Internet Retail Cortana MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Physical Security Cyberattacks Digital Obstacle Manufacturing Alt Codes Black Friday Roanoke — Central Technology Solutions Supercomputer Superfish Cryptocurrency Fraud Screen Reader G Suite History 3D Printing Consulting Transportation Mobile VoIP Mirgation Tracking Development Zero-Day Threat Employer/Employee Relationships Motherboard Google Maps Processors OneNote Bluetooth Virtual Assistant Vendor Downloads Augmented Reality Taxes Managing Stress Instant Messaging IT Budget Tech Terms Proactive IT Remote Worker Batteries Hacks User Error Language Office Tips eWaste Read Only Spyware Course Hard Disk Drives Typing Cyber Monday technology services provider Marketing Backup and Disaster Recovery Projects Smart Tech Cabling Unsupported Software Virus Managed Services Provider Shortcut Best Practice Cyber security Migration Update Cables Proactive Maintenance Data Warehousing Buisness Wasting Time Smart Devices Operations Enterprise Content Management Finance Firefox Error Printers Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Hard Disk Drive Students IT Consultant