mm

Written By

W. Scott Montgomery

mm

 

Written By

W. Scott Montgomery

Share

Subscribe

Stay up-to-date with OST blog posts.

July 21, 2014

One of the biggest complaints we hear from computer users is, “I have to re-enter my password dozens of times throughout the day.”

Ok, yep, I hear you. I have to do the same thing. So how can we make the best of it?

I can’t recommend creating a password that is so simple that it can be typed mindlessly over and over again. Password strength is a critical element in good IT Security. So what can we do? How about creating a password that can improve your life? One that can motivate you to greatness? Can this be done?

Start by picking a goal, any goal. Then create a password based on this goal. The process of typing it in over and over throughout the day should help to keep it within your focus. Let me give you a couple of examples:

  • p@yOFFvisaBY2015  See what I did there? This password will act as a constant reminder to “Pay off my Visa by 2015”. It’s a goal, something I want to strive to achieve. How about a few more?
  • g3tanAinA1gebra  “Get an A in Algebra”
  • R3@d4BOOKSinJuly  “Read 4 books on July”
  • ca11DADeveryFriday  “Call Dad every Friday”

Will this work for all your passwords? Probably not. My recommendation would be that you use this model for the passwords that require periodic changes. For example, if your password at work needs to be changed every 90 days, then use this for a 90 day goal. Passwords that are changed less frequently can be longer term goals.

This is a simple trick. It may not be for everyone, but I challenge you to give it a try.

Share

Subscribe

Stay up-to-date with OST blog posts.

About the Author

Scott Montgomery joined OST in the spring of 2009 as the Manager of the OST Security Practice. Scott comes to OST with over 25 years of IT and IT Security related experience. Within the last ten years, Scott has personally performed more than 1000 Security Assessments for several hundred organizations. Using a proprietary and unique assessment approach, developed by Scott and used since 1998, the OST Security Team has the ability to gather, analyze and assess the security of any organization. The Montgomery Method ™ guarantees comprehensive security results for even the most complex of computing environments.

Scott has a Degree in Computer Information Service from Ferris State University. Scott’s articles and quotes often appear in trade publications and he is regularly invited to speak publicly about Computer Security, Identify Theft and Technology Trends.