Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

We’ve All Been There!

If a program mandates you to change your password, what do you do? You change it of course, but how much do you actually differ your previous password from your new one? If you’re like the majority of all computer users, chances are you change a single number. Remembering passwords is difficult, which understandably results in 66% of surveyed Americans admitting to using and repeating weak passwords such as “abc123” or “QWERTY”. 

So how can we combat our forgetfulness? Certainly not writing our passwords down and leaving them in your desk. Tooling has been developed to aid users in not only remembering passwords but making them better. Password managers, like the one from Google, are built into Google accounts as well as the Chrome browser. Not only does this eliminate the need for repetitive, unsophisticated passwords, it also makes them easier to enter. 

Unfortunately, the team at Google has noticed that despite the convenience offered with these applications, it simply was not motivating users to use more complex passwords. As a result, Password Checkup was developed. 

What Does Password Checkup Do?

Password Checkup examines the passwords that it has saved in your Google Account, and confidentially analyzes them. The examination process identifies bad password practices, such as: 

  • Security Breach Involvement - Your passwords are cross examined with known third-party breaches. 
  • Password Reuse - Nobody is perfect, we’ve all done it. However, there is no longer an excuse to reuse the same password over and over again, across multiple accounts. Tools are available to prevent headaches previously associated with complex, intricate passwords. 
  • Insufficient password strength - Password Checkup easily identifies the all too common trait of passwords -- lack of complexity. Cybercriminals’ tooling is evolving in a way that these weak passwords are no longer able to secure your account. This is why some programs mandate special characters, or capitalization. Some even rate your password strength as you enter it and mandate a minimum level of strength. 

Google now has the ability to inform users of their horrendous password practices they continue to practice every day.  

This extension has been available in the Chrome Web Store as of February 2019. Due to the importance of users locking down their personal security, this extension has been directly integrated into Chrome and Google accounts. 

It can be used by going to while logged into your Google account!

Now Is the Time - Improve Your Passwords!

You no longer have an excuse, it’s time to step up your security. Consider using the following tips to increase your password strength and remember not to use the same password everywhere. 

Step #1: Consider Using Passphrases!

Passphrases are a simple yet effective way to step-up your password strength. Not only is using a passphrase more effective, it is also easier for a user to remember. This is due to the personalization associated with a passphrase. Rather than trying to remember randomized letters or numbers, or sacrificing security for memorability, use a passphrase! 

Let’s say for example you like Shakespeare and love the phrase “To be or not to be”. This phrase would be a great foundation for a password. 

Example: ToBeOrNotToBe

Step #2: Switch Out Some Characters!

Alright Romeo, it’s time to further enhance your security. This simple complexity trick is easy to remember as a result of the similarity you can incorporate with the characters you choose. For example, let’s modify our previous passphrase into something a bit more secure.

Example: 2B0rN0t2B

Step #3: Add Some Additional Details!

That password comes up a little short, so adding further details will inherently improve your password’s security.  Add more memorable text to your password to ensure your password is at the maximum-security level. 

Example: Jul13T2B0rN0t2B!?

Remember, don’t use this for multiple applications. That is poor password practice. Instead, if you are a Shakespeare enthusiast, use a quote from a different play and turn it into a complex, secure passphrase! 

This might seem like it might be frustrating to re-enter constantly but remember… password management tools are here to help. So are we! Central Technology Solutions can help you procure password management tools to eliminate bad password practices in the workplace. Call 1-844-237-4300 today to learn more! 

Tip of the Week: Managing Your IT Inventory Manage...
The Security Risks of Using Workarounds to Get iMe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 04 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Hosted Solutions Data Privacy Network Security IT Services Email Data Backup Malware Internet Hackers IT Support Software Efficiency Business Outsourced IT Innovation Microsoft Mobile Devices Productivity Data Recovery Computer Hardware Managed IT Services Small Business Upgrade Business Continuity IT Support Google Backup Cloud Computing Cybersecurity Collaboration Phishing Smartphone Ransomware User Tips Communication Tech Term Business Management Managed Service Provider Managed IT Services Disaster Recovery Workplace Tips Windows 10 VoIP Internet of Things Mobile Device Managed Service Smartphones Android Paperless Office Social Media Remote Monitoring Quick Tips Data Management Browser Encryption Managed IT Saving Money communications Network Facebook Save Money Server Windows 10 Artificial Intelligence Windows Office 365 Business Technology Virtualization BDR Miscellaneous Holiday Help Desk Risk Management Wi-Fi Covid-19 Compliance Passwords BYOD Automation Government Users Windows 7 Document Management Vendor Management Healthcare Password Apps Mobile Device Management Training Remote Work Health App Office Microsoft Office Bring Your Own Device Going Green Recovery Chrome Unified Threat Management Bandwidth Laptops Avoiding Downtime Analytics Robot Gmail Firewall Employer-Employee Relationship Applications Big Data Data Security Data storage Storage Computing Processor Information Technology Wireless Hosted Solution Blockchain IT Management Website Redundancy Tip of the week Scam Project Management Content Filtering Antivirus Apple Telephone Systems Mobility SaaS Regulations File Sharing Information Infrastructure Computers Two-factor Authentication Money Data loss Vulnerability Maintenance Company Culture RMM OneDrive Unified Communications Budget Politics Proactive Operating System Flexibility Downtime Printing Work/Life Balance Employee-Employer Relationship Customer Service Access Control Remote Computing Settings Virtual Reality VPN Machine Learning Hard Drive IoT Social Customer Relationship Management Tablet IT Service Virtual Private Network Meetings Gadgets Software as a Service Files Router Data Storage Smart Technology Assessment How To Co-Managed IT Private Cloud Net Neutrality Recycling Server Management How To Samsung Tech Support Spam Utility Computing Consulting WiFi Bitcoin Consultation YouTube Uninterrupted Power Supply Professional Services Managed Services Digital Payment Internet Exlporer Chromebook Mouse Websites Identity Theft Managed Services Provider Outlook HIPAA Administration Licensing Cooperation Word Search Education Remote Monitoring and Management Google Drive LiFi Mobile Security Management Remote Worker Upgrades Twitter IT solutions Remote Workers Business Growth Social Network Mobile Computing Display Mobile Office Sports Dark Web Time Management Networking End of Support Augmented Reality Hacker Patch Management Solid State Drive File Management Wireless Technology Legal The Internet of Things Electronic Health Records Current Events Data Breach Monitors Payment Cards Alert Monitoring Network Management Electronic Medical Records Employees Taxes Technology Assurance Group ’s 18 Asset Tracking Cryptocurrency 5G IT Google Maps Computing Infrastructure Conferencing Disaster PowerPoint Trending Value of Managed Services Social Engineering USB Technology Tips Chatbots MSP Mail Merge Mobile Data IT Budget Cyberattacks Windows Server Technology Laws Laptop VoIP Sponsor Telephone Microsoft Excel Modem Hacks Touchscreen Techology Video Conferencing Cabling Multi-Factor Security Wearable Technology Development Typing Zero-Day Threat CRM Distributed Denial of Service Annual Convention OneNote Wireless Internet Lenovo Business Telephone Dark Data Personal Information Printer Alerts Managing Stress Best Practice Instant Messaging Safety Comparison Identity Tech Terms Manufacturing Address Optimization eWaste Read Only Security Cameras Statistics User Management Point of Sale Remote Working Backup and Disaster Recovery Digital Transportation Obstacle Mobile VoIP Notifications Cookies Disaster Resistance Biometric Cybercrime Google Calendar Cables Black Market Telephony Managed IT Service San Diego Windows 8 Save Time Employer/Employee Relationships Superfish IT Assessment Sync Enterprise Content Management Finance Virtual Assistant Vendor Specifications Identities Theft Hard Disk Drives Virtual Machines Public Cloud Bluetooth Batteries Writing Emoji Law Enforcement Wires Human Error Spyware Course Cyber security Botnet Permissions Nanotechnology Cost Management E-Commerce Projects Proactive IT Gamification Network Congestion Travel Virtual Desktop Legislation IT Technicians Break Fix Social Networking Connectivity Proactive Maintenance Digitize Computer Repair Mobile Device Managment Software Tips SharePoint Staff Vulnerabilities Authentication Google Wallet Wasting Time Shortcut Smart Devices Gadget Peripheral Black Friday Roanoke — Central Technology Solutions WPA3 Hard Drives Financial Google Docs Firefox Solid State Drives Credit Cards Physical Security Automobile Computer Care Unified Threat Management Hotspot Enterprise Resource Planning Bookmarks ROI Retail Cortana Permission Teamwork 3D Printing Fraud Screen Reader Features Humor Heating/Cooling Return on Investment IT Consulting Mirgation Processors GPS Motherboard Backups Database Management Shadow IT Downloads Geography Authorization Drones WannaCry Database Sensors Marketing PCI DSS Cyber Monday technology services provider Fleet Tracking Procurement Options Holidays Office Tips User Error Language Mobile Deep Learning Favorites Notes Hacking Migration Test Shared resources Windows Server 2008 Unsupported Software Virus Supercomputer Buisness Smart Tech Cache Servers Active Directory Update Crowdsourcing Outsource IT Tracking Data Warehousing Star Wars GDPR Outsourcing G Suite History Operations High-Speed Internet Alt Codes Voice over Internet Protocol Webcam IT Consultant Error Printers Web Server Students Hard Disk Drive Cameras Motion Sickness CCTV Emergency Administrator Regulation CrashOverride Relocation