(415) 246-0101

Microtechs Blog

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Microtechs would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Tech Term Privacy Productivity Smartphones Internet Malware Cybersecurity Efficiency Browser Cloud Mobile Device Communication Hardware Microsoft Android Small Business Network IT Support Email Data Passwords Wi-Fi Google Ransomware Windows 10 Data Backup Software IT Services Hosted Solutions Saving Money Wireless Internet of Things Holiday Mobile Devices Managed IT services Communications Data recovery Applications Business Management Backup Collaboration Users Workplace Tips Blockchain Cloud Computing Marketing Outsourced IT VoIp Business Information Managed IT Services Smartphone Employer-Employee Relationship Hackers Networking Social Media Innovation Business Intelligence Data Management Bandwidth Managed Service Tech Terms Remote Computing Computers BDR Automation Compliance Save Money Phishing Government Connectivity Artificial Intelligence Router Managed IT Service Excel Password Remote Monitoring and Management Computer Access Control Wireless Charging Apps Data Breach Analytics Patch Management Virtual Assistant Microsoft Office Virtualization Data Protection VPN Cortana Gmail Miscellaneous Cost Management Staff Internet Explorer Analysis Millennials Training Facebook Unified Communications Company Culture Authorization Server Telecommute Database Help Desk Spyware Downloads Settings Voice over Internet Protocol Outlook WannaCry User Security Sports SaaS Voice over IP Big Data Apple Specifications Environment Threat Security Cameras Edge Twitter RAM Managing Stress Data loss Cybercrime Plug-In Business Continuity HP Sales Backup and Disaster Recovery Trends Touchscreen Chrome Profitability HIPAA GDPR iPhone Conferencing e-waste File Sharing Websites Printing Word Inventory G Suite Network Attached Storage Spam Tactics Proactive IT Telecommuting Upgrade Document Management Tablet Hard Drives A.I. Microsoft Office 365 Battery IT budget Eliminating Downtime Hard Drive Storage eCommerce Physical Security Office disposal Safety Paper Wearables Mobile Security Bring Your Own Device Lead Generation Virus Certification Paperless Office SSD Movies Law Enforcement Value Amazon Tip of the week BYOD Processors Business Technology Dark Web Online Shopping Laptop Content Filtering Machine Learning Ink Reporting Office 365 Operating System Hybrid Cloud Troubleshooting Antivirus Maintenance Workers Mobility Digital Knowledge Microsoft Teams Authentication IT Management User Tip Wireless Internet Vulnerability Technology Tips Streaming Media Error Gadgets Dongle PowerPoint Medical IT Telephony How To Comparison Server Management Cables Update Quick Tips Disaster Recovery Thank You Regulation Printers Alert Congratulations Healthcare