(415) 246-0101

Microtechs Blog

Microtechs has been serving the Mill Valley area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Microtechs would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Cybersecurity Hardware Network Security Malware Internet Ransomware Business Computing Wi-Fi Smartphones Technology Android Email Applications Cloud Passwords Backup Business IT Services Software Small Business Employer-Employee Relationship Outsourced IT Phishing Managed IT services Government Communications Excel Microsoft Computers IT Support Cortana Save Money Windows 10 Data Saving Money VPN Smartphone Data Management Data Breach Tech Terms Remote Computing Holiday Knowledge BDR Mobile Devices Gmail Google Network Attached Storage Miscellaneous Spam Document Management Telecommuting eCommerce Physical Security Lead Generation Password User Security Virus Paperless Office Online Shopping Hackers Laptop Virtual Assistant Chrome Efficiency VoIp Antivirus Digital Workers User Tips Technology Tips Innovation Server Management Staff Browser Millennials Settings Data Backup Blockchain Communication WannaCry Law Enforcement Business Technology Cloud Computing Edge Productivity Wireless Patch Management Backup and Disaster Recovery Automation HIPAA User Tip Data Protection Websites Battery Comparison Hard Drives How To IT budget Artificial Intelligence Hard Drive Managed IT Services Managed IT Service Safety Wireless Charging Specifications SSD Apple Business Management Hosted Solutions Machine Learning Processors Tip of the week Office 365 Sales Networking Analytics Virtualization Conferencing Social Media iPhone IT Management File Sharing Vulnerability Telephony Tablet Dongle Business Intelligence Server Office Facebook Router Telecommute Spyware Voice over IP Computer Bandwidth Big Data Marketing Content Filtering Twitter Data loss HP Inventory Gadgets Data recovery Mobile Security Thank You Congratulations

Blog Archive

May
June
July
August
September
October
November
December
January
February
March
April
May
June
July
September