888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Strata Information Technology would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Business Computing Managed IT Services Cloud Technology Malware Hackers Communications Outsourced IT Ransomware Best Practices Productivity VoIP Internet Software Alert Backup Cybersecurity Business Phishing IT Support Vulnerability Business Management Windows 10 Network Security Microsoft Passwords Data Breach App Android Smartphones Save Money Workers User Tips Miscellaneous Google Social Media Excel Microsoft Office IT Services Smartphone Office 365 Remote Monitoring Settings Saving Money Scam Politics Mobile Device Management Hardware Government Email Business Continuity Small Business Law Enforcement Browser Patch Management Office Holiday Personal Information Retail Vendor Management Cybercrime Chrome Access Control Twitter Windows Computer Communication Mobile Device Website Education Bandwidth Data Backup Hosted Solutions Efficiency Word Data Apps How To Entertainment Productivity Recovery Applications Cloud Computing Access Physical Security Leadership Managed IT Employer Employee Relationship HIPAA Blockchain Password Employer-Employee Relationship Innovation Users Tablet BYOD Files Encryption Automobile Hard Drive Remote Support Computers Network Collaboration Company Culture Synergy Knowledge Managed IT Service Analytics SaaS Processors IT budget Scalability Internet of Things Comparison Telephony Emergency IaaS Phone System Spyware Apple IT Management Credit Cards Smart Technology Multi-Factor Security Cortana Dark Data Specifications Voice over IP Printer Server Licensing HaaS Managed Service Provider HP iPhone Facebook Data Recovery Unified Threat Management Marketing Printers Travel Cleaning Gadget WiFi Current Events Battery VPN Botnet Content Filtering Live Streaming Document Management Computer Care Shortcut Data Management Data Protection Net Neutrality Telephone Systems Gmail Disaster Recovery Automation WhatsApp Paperless Office Gaming Console CrashOverride Remote Control Yahoo Spam Dark Web DDoS Lead Generation Virus Digital Video Games Worker Two-factor Authentication Information Technology Television Google Maps Avoiding Downtime Virtual Assistant News Edge Printer Email Management Tech Support Biometrics Staffing The Internet of Things WannaCry Telephone System Maintenance Hiring/Firing Antivirus Budget Gadgets Sales Competition Telecommuting Managed IT Services Fun Big Data Millennials Upgrade Google Drive Virtualization IT Support Wireless Search Hosted Solution Server Presentation Wi-Fi Scheduling Copy Emoji Wireless Technology VoIP 5G Instagram Samsung IBM Tech Terms Paste Hacker Conferencing eCommerce Cost Management Customer Relationship Management Network Attached Storage Business Intelligence Router IP Address Online Shopping Customer Service Mobile Office Domains Wireless Charging Hard Drives File Sharing User Tip Autocorrect Public Speaking Mobile Devices Spam Blocking User Security Tip of the week Lithium-ion battery Augmented Reality Windows 10 Business Technology Remote Computing Safety Money Laptop

Newsletter Sign Up