TWT-security-password-tool-1440.jpg
TWT-security-password-tool-600.jpg

Strong Password Generator

Use our easy tool to quickly and easily generate strong passwords.

While sophisticated hackers will always try to exploit security vulnerabilities to access your accounts, most security breaches happen after sharing passwords or accidentally granting someone physical access to your system.

This random password generator creates an 16-character password. Simply copy-paste it into your password field.

Want a stronger password? Add characters. Want a seriously strong password? Generate two passwords and paste them together. Never share your password with anyone, and don't email it, not even to yourself.

Don’t feel like you need to share your password with anyone, even if it’s the person you hired to manage your computer network. If your IT service provider needs your password to install an update or access your network, offer to type it in yourself. Don’t write it down for them or send it to them in an email.

 
 
 
 

TWT’s Managed IT solution set the KAYAK team up for success.

When KAYAK was moving to a new space (doubling the footprint), it was the perfect opportunity for owner Randy to look at all the existing networking technology and processes that were in place and make some changes to help support KAYAK’s growth plan

Learn More

Have a password contingency plan.

You want to be the one in control of your digital security at all times, even if IT isn’t your specialty. While you must put a certain level of trust in your IT service provider, you need a plan in case something goes awry. When your IT manager moves to a new job or you have to fire them, what guarantees do you have that he or she won’t share your information? Do you have mechanisms in place for resetting relevant passwords and revoking network access?

Be wary of BYOD

Bring Your Own Device can be a valuable cost-saving strategy for your small business, but it presents a security risk when it comes to protecting passwords and data. The security perimeter you build around your corporate network is essentially destroyed when you allow employees to access internal networks with their own devices. It may be convenient having your employee use his iPad on a business trip, but what happens if the corporate data he accesses from his device is uploaded to his personalDropbox account? Should your employee quit, how do you revoke access to an app or program without accessing the device itself?