Password Security

by Jon Lober | NOC Technology

Old and new recommendations for keeping your digital assets secure.

In honor of World Password Day, we’re going to review some longstanding best password practices and update you on some surprising recent recommendations that can help you improve password usage in your small business. 


Why do we need to go over password security again?

Because it’s still a major problem. 81% of company data breaches are due to poor passwords. Any guess on what the most popular password (still) is? password


Password integrity remains a critically-important issue for businesses of all sizes despite significant improvements in modern cybersecurity resources such as two-factor authentication (2FA), password policies, and even the movement to eliminate passwords entirely


Does any of the following look familiar to you? 

  • password1 
  • guest 
  • trustno1 
  • letmein 
  • qwertyuiop 
  • peanut 
  • blessed 
  • poohbear 


Hopefully you don’t use any of these passwords or their closely-related cousins. The selection above was pulled from NordPass’s annual roundup of the world’s most popular passwords. These passwords were all in the United States’ top 200 list and represent easy pickings for any hacker. 


Best password practices—some reminders

According to security.org, at the very least your business should implement the following characteristics to your organization’s passwords to ensure their integrity: 

  • Uniqueness: Each account should have an individual password not used in any other software or system. 52% of Americans use the same password across multiple accounts, leaving an open door to multiple accounts if hackers can breach just one. 
  • Strength: Longer and more complex passwords are stronger passwords. A mixture of uppercase and lowercase letters, numbers, symbols and even emojis (when permitted) make a password more complex. Do you want to see how strong your password is? Try this password strength tool. 
  • Storage: Don’t write your password down, rely on your memory, or share them with others. Password managers offer the most secure storage method for your suite of secrets. 
  • Authentication: Two-factor authentication (2FA) offers a far greater level of security than standard passwords. Add 2FA to your accounts to verify your identify through a dedicated app, SMS text, or email.   
  • Monitoring: Quality password managers will notify you if you have been compromised through a data breach behind the scenes of one of your accounts. Additionally, a good IT company with cybersecurity experience can help you perform dark web scans to make sure that no one is selling your information on the black market. 


Prioritize longer passwords. Password length is more important than password complexity. 

Although both length and complexity improve password effectiveness, length is a more effective factor according to the National Institute of Standards and Technology (NIST), the government body responsible for establishing best practices in cybersecurity. 


In Special Publication 800-63B, the NIST’s most recent set of technical recommendations, the organization recognizes that strings of incomprehensible gibberish are difficult for the average human to memorize – and can lead to poor practices like password repetition. As a result, the NIST recommends that users prioritize longer, more memorable passwords or complex passphrases (a combination of words and symbols like Stay!oUt_0fH3re). 

Artificial Intelligence (AI) commonly available to hackers can now crack even complex passwords with seven characters or less in under 6 minutes. As a result, a secure password should be at least 10 complex characters in length – with 12+ characters providing very secure results.  

Don’t require periodic password updates.

Once again, human nature is behind this recent recommendation change from the NIST. 

Although most IT professionals and cybersecurity experts previously recommended regular changes to your passwords, we now recognize that these requirements often lead to poor security habits. Instead of completely resetting a password to another unique strong password, users often just slightly adjust their current password or reuse a password from another account—compromising multiple systems. 


Eliminate hints or other types of knowledge-based-authentication. 

Instead of choosing complex questions and subtle answers for password hints or prompts, users tend to gravitate towards simpler, less forgettable possibilities. This makes it far easier for a potential cybercriminal to hack accounts. Since two-factor authentication offers a much more secure option for organizations, they should use this option instead of knowledge-based forms of authentication. 


Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
Could your sheltered workshop benefit from grant funding for new technology?
By Jon Lober April 7, 2025
As a sheltered workshop, you play a crucial role in providing meaningful employment opportunities for individuals with disabilities. However, like any organization, securing funding for technology upgrades can be a challenge. While investing in the right tools can improve efficiency, security, and overall productivity—that’s all only if you can afford the tools in the first place.
best office pranks for April Fools 2025
By Jon Lober March 31, 2025
Need April Fools pranks for your office? This list is technically harmless, but great fun. Happy pranking!
More Articles