(415) 246-0101

Microtechs Blog

Microtechs has been serving the Mill Valley area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Microtechs would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 16 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Network Security Privacy Cybersecurity Technology Hardware Tech Term Wi-Fi Ransomware Malware Internet Smartphones Android Passwords Backup Employer-Employee Relationship Small Business Data Managed IT services Communications Email Business Management Applications Microsoft IT Support Cloud Mobile Devices Smartphone Router Virtual Assistant Computer Data Breach Innovation Remote Computing Cost Management Gmail Google Blockchain Communication Software IT Services Computers Save Money Outsourced IT VoIp Phishing Artificial Intelligence Government Wireless Charging Excel Networking Productivity Social Media Wireless Patch Management VPN Data Protection Collaboration Business Intelligence Cortana Network Data Management Managed IT Service Windows 10 Tech Terms Saving Money Business Spam Internet of Things Document Management Conferencing Tactics iPhone File Sharing Data recovery Microsoft Teams Physical Security Lead Generation Telephony Tablet Mobile Security Users Password Virus Connectivity Paperless Office Office Hackers Company Culture Laptop Voice over IP Operating System Workplace Tips Efficiency Antivirus Apps Digital Content Filtering Technology Tips Managing Stress Holiday Knowledge Server Management Maintenance Staff Streaming Media Browser Telecommuting Miscellaneous Data Backup G Suite WannaCry eCommerce Environment Internet Explorer Cloud Computing Downloads Edge User Security Backup and Disaster Recovery Bring Your Own Device HIPAA Online Shopping e-waste Automation Threat Chrome Websites Trends Workers Hard Drives Hybrid Cloud IT budget Battery Hard Drive User Tips disposal Printing Safety A.I. Millennials SSD Cables Processors Settings Value Machine Learning Paper Law Enforcement Movies Analytics Business Technology Voice over Internet Protocol IT Management Virtualization Vulnerability Ink Dongle User Tip Facebook Server Spyware Comparison Database How To Telecommute PowerPoint Bandwidth Unified Communications Big Data Managed IT Services Twitter Information Marketing HP Specifications Cybercrime Apple Data loss Sports Hosted Solutions BDR RAM Tip of the week Office 365 Sales Inventory Amazon Network Attached Storage Alert Thank You Congratulations Plug-In Gadgets Proactive IT Remote Monitoring and Management