Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

What Is Password Checkup?

Consider how common weak passwords (things like “abc123” or “QWERTY” or “password”) are, even after the vulnerabilities that passwords like these can present have been so clearly demonstrated. There are entire lists available online discussing how common these kinds of passwords are. A whole 66 percent of surveyed Americans confess to using - and repeating - weak passwords across accounts.

Many tools have been designed to help fight these tendencies, like the password managers that many different designers have tackled - including the team at Google. One major step to accomplishing this goal was to introduce a built-in password manager to a user’s Google account and Chrome browser. Not only does this option eliminate the need for a user to remember dozens of different passwords, it simply makes them more convenient to input.

However, this didn’t really stop users from resorting to sub-par passwords, so Google has released another new feature, incorporated into its password management solution, to help users maintain proper password security. This feature is known as Password Checkup.

What Does Password Checkup Do?

Password Checkup examines the passwords that you have saved to your Google Account and confidentially analyzes them for common issues, like:

  • Involvement in a security breach - Has one of your passwords been exposed in a third-party breach to attackers?
  • Password reuse - Is a password repeated across different sites? Instead of one account being breached, this opens multiple accounts to easier misuse.
  • Insufficient password strength - How easy would someone find it to guess your password, with just a little bit of online digging to inform them?

As a result of these checks, Google can inform users when a password needs to be changed - and these alerts will also pop up in context.

This feature was made available as an extension of the Chrome Web Store in February of 2019. However, due to the importance of security, its features have been directly integrated into Chrome and Google accounts.

You can use the new password tool by going to https://passwords.google.com while logged into your Google account.

How Else Can I Improve My Passwords?

There are numerous methods that can be used to increase the security of your passwords, in addition to relying on a tool from Google. For instance:

  • Consider Using Passphrases - Passphrases are an alternative to passwords that have shown to be effective security measures, while also being more memorable to a user. Rather than trying to remember a series of random letters, numbers, and symbols, a passphrase requires a user to remember a pattern of disparate words with no context to connect them. This is inherently easier to remember, as you can create a reminder that gives you enough context to recall your passphrase.

    So, let’s say you picture a census taker reclining on a couch, smiling as he slurps down some minestrone. This image could be your reminder for a passphrase like “PollSatisfiedLoungeSip.”

  • Switch Out the Digits - Once you’ve created a passphrase that you are happy with, you can always incorporate some other password complexity tricks, like substituting different characters for others. So, returning to our example, “PollSatisfiedLoungeSip” could become “P0!!Satisfi3dL0ung3$!p.”

  • Add Details - As the time comes to update your passphrase, you may consider simply adding a detail to your imagined image. Perhaps our census taker specializes in automotive data, making our updated passphrase read: “Vr00mP0!!Satisfi3dL0ung3$!p.”

Passwords are one of the most basic fundamentals of your business’ data security, which means you have to be sure that they are able to hold their own against the many means out there to undermine them. Voyage Technology can help you to accomplish this, and many more elements of your business IT’s security and functionality. Call 800.618.9844 today to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Automation Facebook Artificial Intelligence Miscellaneous Holiday Training Covid-19 Gadgets Compliance Cloud Computing Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Virtualization Bandwidth Wi-Fi Blockchain Two-factor Authentication Vendor Apps Managed Services Data Security Mobile Office Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Employer-Employee Relationship Apple Networking Voice over Internet Protocol App BYOD HIPAA Access Control Applications Office 365 Conferencing Managed IT Services How To BDR Hacker Avoiding Downtime Computing Marketing Physical Security Information Technology Router Health Analytics Office Tips Augmented Reality 2FA Retail Help Desk Big Data Storage Password Bring Your Own Device Healthcare Computers Operating System Website Risk Management Virtual Private Network Printer Solutions Firewall Paperless Office Infrastructure Document Management Windows 11 The Internet of Things Monitoring Social Excel Scam Data loss Managed IT Service Remote Workers Telephone Customer Service Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Vulnerability Project Management Windows 7 Vendor Management Cybercrime Microsoft 365 Display Computer Repair Virtual Desktop Employees Data storage LiFi Integration User Tip Modem Safety Outlook Mobile Security Processor Machine Learning Money Holidays Humor Data Storage Smart Technology Supply Chain Video Conferencing Maintenance Antivirus Managed Services Provider Sports Professional Services Saving Time Mouse Virtual Machines Administration Customer Relationship Management Downloads iPhone Hacking Licensing Robot Presentation Vulnerabilities Entertainment Data Privacy Settings Wireless Wireless Technology Printing Content Filtering Images 101 IT Management YouTube Meetings Mobility Telephone System VPN Multi-Factor Authentication Cost Management Cryptocurrency Word Google Docs Assessment Electronic Health Records Unified Communications Permissions Workforce Experience Directions Videos Refrigeration Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Specifications Security Cameras Workplace Strategies Monitors Public Speaking Google Wallet Trend Micro Lithium-ion battery Internet Exlporer Software as a Service Fraud Meta Microchip Username Windows 8 Managing Costs Amazon Entrepreneur Laptop Websites Black Friday SSID Drones eCommerce SharePoint Database Surveillance Virtual Assistant Outsource IT Electronic Medical Records Undo IT Technicians Virtual Machine Environment Halloween Media Cyber Monday Medical IT Writing Proxy Server Reviews Lenovo Cookies Tactics Development Hotspot Transportation Small Businesses Virtual Reality Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Identity Theft PowerPoint Fun Shopping Superfish Nanotechnology Optimization Addiction Application Deep Learning Language Employer/Employee Relationships Outsourcing Twitter Management PCI DSS Chatbots Error Navigation Education Distributed Denial of Service Workplace Social Engineering Gig Economy IBM Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Remote Computing Regulations Compliance Mobile Computing Identity Evernote Paperless Smart Tech Memes Tablet Co-managed IT Search Bookmark Download Net Neutrality Best Practice Alerts SQL Server Technology Care Alert Buisness File Sharing Business Communications Dark Data Financial Data Competition Managed IT History Legal Connectivity IT IT solutions Break Fix Scams How To Browsers Smartwatch Upload Procurement Business Growth Azure Hybrid Work Notifications Travel Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Techology IoT Communitications User Google Maps Dark Web Cables Cortana CES Trends Supply Chain Management Alt Codes Downtime Unified Threat Management Google Calendar Term Google Apps Customer Resource management FinTech Regulations Unified Threat Management Star Wars IT Assessment Hosted Solution Microsoft Excel IT Maintenance Data Analysis IP Address Gamification Flexibility Typing Staff Value Business Intelligence Legislation Shortcuts Network Congestion Organization Social Networking Google Drive User Error Smart Devices Recovery Ransmoware Knowledge Fileless Malware Digital Security Cameras Content Remote Working Hard Drives Wearable Technology Memory Vendors Point of Sale Comparison Google Play Be Proactive 5G Health IT Domains Motherboard Data Breach

Blog Archive