ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

What Is Password Checkup?

Consider how common weak passwords (things like “abc123” or “QWERTY” or “password”) are, even after the vulnerabilities that passwords like these can present have been so clearly demonstrated. There are entire lists available online discussing how common these kinds of passwords are. A whole 66 percent of surveyed Americans confess to using - and repeating - weak passwords across accounts.

Many tools have been designed to help fight these tendencies, like the password managers that many different designers have tackled - including the team at Google. One major step to accomplishing this goal was to introduce a built-in password manager to a user’s Google account and Chrome browser. Not only does this option eliminate the need for a user to remember dozens of different passwords, it simply makes them more convenient to input.

However, this didn’t really stop users from resorting to sub-par passwords, so Google has released another new feature, incorporated into its password management solution, to help users maintain proper password security. This feature is known as Password Checkup.

What Does Password Checkup Do?

Password Checkup examines the passwords that you have saved to your Google Account and confidentially analyzes them for common issues, like:

  • Involvement in a security breach - Has one of your passwords been exposed in a third-party breach to attackers?
  • Password reuse - Is a password repeated across different sites? Instead of one account being breached, this opens multiple accounts to easier misuse.
  • Insufficient password strength - How easy would someone find it to guess your password, with just a little bit of online digging to inform them?

As a result of these checks, Google can inform users when a password needs to be changed - and these alerts will also pop up in context.

This feature was made available as an extension of the Chrome Web Store in February of 2019. However, due to the importance of security, its features have been directly integrated into Chrome and Google accounts.

You can use the new password tool by going to https://passwords.google.com while logged into your Google account.

How Else Can I Improve My Passwords?

There are numerous methods that can be used to increase the security of your passwords, in addition to relying on a tool from Google. For instance:

  • Consider Using Passphrases - Passphrases are an alternative to passwords that have shown to be effective security measures, while also being more memorable to a user. Rather than trying to remember a series of random letters, numbers, and symbols, a passphrase requires a user to remember a pattern of disparate words with no context to connect them. This is inherently easier to remember, as you can create a reminder that gives you enough context to recall your passphrase.

    So, let’s say you picture a census taker reclining on a couch, smiling as he slurps down some minestrone. This image could be your reminder for a passphrase like “PollSatisfiedLoungeSip.”

  • Switch Out the Digits - Once you’ve created a passphrase that you are happy with, you can always incorporate some other password complexity tricks, like substituting different characters for others. So, returning to our example, “PollSatisfiedLoungeSip” could become “P0!!Satisfi3dL0ung3$!p.”

  • Add Details - As the time comes to update your passphrase, you may consider simply adding a detail to your imagined image. Perhaps our census taker specializes in automotive data, making our updated passphrase read: “Vr00mP0!!Satisfi3dL0ung3$!p.”

Passwords are one of the most basic fundamentals of your business’ data security, which means you have to be sure that they are able to hold their own against the many means out there to undermine them. ClearView IT can help you to accomplish this, and many more elements of your business IT’s security and functionality. Call 866-326-7214 today to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Windows 10 Managed Service Apps Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Artificial Intelligence Gadgets Managed IT services Workplace Strategy Networking Windows App WiFi Virtualization Remote Information Spam Business Technology Bandwidth Encryption Blockchain Server Mobile Device Management Office Two-factor Authentication Apple Office 365 Employee/Employer Relationship Information Technology History Budget Gmail Conferencing BDR Cybercrime Wi-Fi Health Access Control Analytics Data Security Big Data Patch Management Help Desk Hacking Cost Management Remote Monitoring Vendor Hacker Document Management IT Management Save Money Voice over Internet Protocol Training Employer-Employee Relationship Compliance Remote Computing Password Vendor Management Hard Drive Project Management Legal Applications Money Data storage Vulnerabilities Customer Service Search... Unified Threat Management Firewall Best Practice Mobile Office Augmented Reality Retail Managed Services Word Alert IBM BYOD Website Hiring/Firing Data loss Computing Outlook Paperless Office The Internet of Things YouTube Antivirus Chrome Maintenance Twitter Laptop Data Breach Law Enforcement End of Support Printer Mobile Computing Websites Mobility Marketing Meetings Running Cable Sports Social Monitoring Google Maps SaaS DDoS Remote Workers Healthcare Scam Travel Virtual Reality Storage Social Engineering Cryptocurrency Windows 7 Black Market iPhone Free Resource Education Cortana VPN Cleaning Content Filtering How To Update Robot User Router Windows 11 Chromebook Drones Employees Virtual Assistant Avoiding Downtime Physical Security Automobile Holidays Wireless Technology eWaste PowerPoint How To Microchip Administration Processor Start Menu Cooperation Flexibility Downtime Downloads Video Conferencing Presentation Computer Care Safety Specifications Vulnerability IT Consultant Virtual Machines Hack Identity Theft Computer Repair Virtual Desktop Notifications Software as a Service Unified Communications Data Protection Customer Relationship Management Professional Services Experience Multi-factor Authentication Co-Managed IT Google Docs Entertainment Bluetooth Distributed Denial of Service Managed Services Provider Office Tips Saving Time Memory Private Cloud Disaster Virtual Private Network Computers Bitcoin Tech Terms Lithium-ion battery Telephone Current Events Managed IT Politics Settings Digital HIPAA Solutions Machine Learning Excel Processors Images 101 Integration Taxes Solid State Drive Display AI Fileless Malware Trend Micro Tip of the week Books Language Digital Security Cameras Audit Society Electronic Health Records Gamification Spyware Transportation Company Culture Supply Chain Wasting Time Regulations File Sharing Telephone System Directions Redundancy Visible Light Communication eCommerce Backup and Disaster Recovery Modem Reading Monitors Public Speaking Videos Windows 8 Surveillance Content Cache Desktop Workplace Managing Costs Accountants Workers Streaming Media Electronic Medical Records Unified Threat Management Inbound Marketing Advertising Database SSID Relocation Displays Keyboard Work/Life Balance Hard Drives Media Printing Tech Support Development Employer/Employee Relationships CCTV Scams Virtual Machine Equifax intranet Health IT Touchscreen Shortcut Reviews Emergency Electronic Payment Optimization Tactics Hard Drive Disposal Computer Malfunction Wireless In Internet of Things Heating/Cooling 2FA Environment Username Vendor Mangement Teamwork Cables Hypervisor Startup Samsung Windows XP Freedom of Information Hacks Network Congestion Social Networking Data Storage Writing Shopping Navigation Addiction Uninterrupted Power Supply Phone System Medical IT email scam Webcam Reliable Computing Paperless Business Mangement SQL Server Mobile Security Point of Sale Licensing Legislation Tablets News PCI DSS User Tip Gig Economy Evernote Humor Network Management Shortcuts Scalability Administrator Text Messaging Business Communications Google Calendar Proactive IT Internet Service Provider Azure Supercomputer Managed IT Service Emails Computer Accessories Fake News Bring Your Own Device Regulations Compliance Proxy Server Virus Memes Service Level Agreement Computing Infrastructure Motion Sickness Be Proactive Staffing IP Address Human Resources Comparison Music Net Neutrality Management Google Drive Device security Wireless Headphones Microsoft Excel Financial Data Risk Management Tech Knowledge IT Going Green Corporate Profile Business Cards Workplace Strategies Botnet Google Apps Television Error Telephony Employer Employee Relationship Cabling Rental Service Micrsooft Telework Bookmark Flash Competition Smartwatch Term Communitications Download Tablet Microsoft 365 Piracy G Suite Recovery Telephone Systems Mouse Business Growth Procurement VoIP Troubleshooting HTML Tracking Nanotechnology LiFi Entrepreneur FinTech Browsers Application CES Google Play IT Assessment Upload Software License Web Server Smart Technology Documents Digital Payment Banking SharePoint Google Wallet Business Intelligence Supply Chain Management Social Network Value Data Analysis Cyber security Screen Reader Worker Messenger Deep Learning Organization Security Cameras Smart Devices Trends Access Mobile Technology Securty Devices Public Cloud Business Metrics Domains Hosted Solution Remote Working Customer Resource management Time Management Business Owner

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?