888.678.7282    Get SUPPORT

Strata Information Technology Blog

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Strata Information Technology would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Malware Communications Cybersecurity Ransomware Hackers Backup Productivity Internet VoIP Tech Term Alert Software Outsourced IT Network Security Smartphones IT Support Passwords Business Management Social Media Hardware Microsoft Data Phishing Save Money Business Windows 10 Data Recovery Smartphone Email Communication IT Services Small Business Data Breach Vulnerability Android Microsoft Office Network App Google Data Backup Twitter Hosted Solutions Business Continuity Compliance BDR Mobile Device Management Law Enforcement Cloud Computing Blockchain Computer Patch Management Workers Apps Settings Employer-Employee Relationship Productivity Remote Monitoring Scam Excel Browser Company Culture Cybercrime Politics Bandwidth Government Office 365 User Tips Miscellaneous Internet of Things Saving Money Spam How To Applications Facebook Entertainment Wi-Fi Recovery Antivirus Mobile Device Maintenance Password Retail Holiday Computers Office Collaboration Education Personal Information Automation Managed IT Service Vendor Management Dark Web Networking Managing Stress Chrome SaaS Access Control Website Virus Users Innovation Efficiency Windows Word Virtual Assistant Wireless Tech Terms Connectivity Staffing Licensing Voice over IP Amazon Smart Technology Email Management HaaS Printer Server Cortana Bring Your Own Device Printer iPhone Mobile Devices Data loss Gadget Telephone System WannaCry Unified Threat Management HP Biometrics Managed Service Provider Cost Management Streaming Media Travel Two-factor Authentication Workplace Tips Business Intelligence Regulation Sales Cleaning Printers Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Tablet Downloads Live Streaming Tech Support Reporting Computer Care Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Safety Gmail Automobile The Internet of Things Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Marketing Paperless Office Tactics BYOD Knowledge Artificial Intelligence Trends WhatsApp Wireless Charging Synergy Gadgets Budget e-waste Disaster Recovery Medical IT IT budget PowerPoint Gaming Console Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Analytics Processors Digital Internet Explorer Comparison Hard Drives A.I. Scalability Phone System Lead Generation disposal GDPR IT Management Sports Video Games Google Maps Emergency Telephony DDoS Inventory Information Remote Monitoring and Management IaaS Dongle Worker Apple Edge Threat Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards News Dark Data Spyware Value Television Information Technology Instagram Mobile Security Paste Business Technology Printing Remote Computing Samsung Money Laptop Error Conferencing Public Speaking Unified Communications Presentation Network Attached Storage Managed IT Services eCommerce Operating System Paper Telecommuting Lithium-ion battery Augmented Reality Wireless Technology 5G Server Management Online Shopping Environment Ink Millennials IBM Fun Hacker Google Drive IT Support Customer Relationship Management Hosted Solution File Sharing Competition User Tip Virtualization Big Data Autocorrect IP Address Machine Learning Customer Service Copy Spam Blocking User Security Search Scheduling Tip of the week Server Upgrade G Suite Windows 10 Mobile Office Domains Telecommute VoIP Emoji

Newsletter Sign Up