(415) 246-0101

Microtechs Blog

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Microtechs would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, October 17 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Malware Cloud Internet Efficiency Passwords Android Browser Productivity Communication User Tips Hardware Microsoft Ransomware Wi-Fi Google Small Business Hosted Solutions Saving Money Data Managed IT services Communications Applications Innovation Business Intelligence Backup Blockchain Social Media Collaboration Users Windows 10 Software Mobile Devices IT Support Mobile Device Workplace Tips VoIp Business Management Network Employer-Employee Relationship Email Analytics Excel Virtual Assistant Router Data recovery Computer Virtualization Artificial Intelligence Information Data Breach Patch Management Hackers Data Management Data Protection Cortana Gmail Networking Miscellaneous Marketing Tech Terms VPN Wireless Computers Cost Management IT Services Remote Computing Save Money Data Backup Business Outsourced IT Bandwidth Managed IT Services Cloud Computing Managed IT Service Phishing Internet of Things Wireless Charging Automation Government BDR Compliance Smartphone Office 365 Hard Drives A.I. Microsoft Office 365 Spam Tactics Proactive IT Connectivity Storage IT Management disposal Law Enforcement Workers Digital Business Technology Mobile Security Bring Your Own Device Content Filtering Vulnerability Safety Paper Telephony SSD Movies Access Control Virus Remote Monitoring and Management Apps Dark Web Knowledge Server Machine Learning Value Amazon User Tip Millennials Reporting Settings Operating System Hybrid Cloud Troubleshooting Spyware Ink Microsoft Office Voice over IP Big Data Microsoft Teams How To Authentication Comparison WannaCry Antivirus Maintenance Gadgets Edge Technology Tips Streaming Media Error Medical IT Server Management Cables Update HP Dongle PowerPoint Analysis User Security Holiday Facebook Unified Communications Company Culture Apple Authorization Specifications HIPAA Staff Internet Explorer Downloads Network Attached Storage Telecommute Database SaaS Sales Battery IT budget Environment Voice over Internet Protocol Chrome Telecommuting Document Management Sports Managed Service eCommerce Physical Security Twitter RAM Managing Stress iPhone Conferencing Hard Drive Threat Backup and Disaster Recovery Trends Touchscreen Lead Generation Password Data loss Cybercrime Plug-In File Sharing GDPR Tablet e-waste Paperless Office Online Shopping Laptop Inventory G Suite Office Tip of the week Processors Websites Printing Thank You Regulation Printers Alert Congratulations Outlook Quick Tips Disaster Recovery