888.678.7282    Get SUPPORT

Strata Information Technology Blog

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Strata Information Technology would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Cloud Best Practices Network Security Internet Cybersecurity Malware Hackers Tech Term Communications Outsourced IT Software Backup VoIP Ransomware Passwords IT Support Productivity Smartphones Alert Business Management Microsoft Communication Efficiency Browser User Tips Social Media Business Windows 10 Data Network Small Business Data Backup Save Money Productivity Hosted Solutions Users Phishing Hardware Data Recovery Google Cloud Computing Email Twitter Vulnerability Apps Microsoft Office Internet of Things Mobile Device Smartphone Miscellaneous Saving Money IT Services Android Data Breach App Bandwidth Patch Management Excel Government Company Culture Politics Networking Settings Office 365 Law Enforcement Innovation Business Continuity Access Control Applications BDR Workplace Tips Blockchain Employer-Employee Relationship Mobile Device Management Compliance Workers Remote Monitoring Scam Collaboration Wi-Fi Cybercrime Computer Automation Managing Stress SaaS Marketing Information Managed IT Service Windows Dark Web Chrome Website Antivirus Virus Connectivity Word Entertainment Facebook Holiday Virtual Assistant Recovery Maintenance Password Spam Wireless How To Education Retail Office Vendor Management Computers Personal Information BYOD Content Filtering Outlook Disaster Recovery e-waste HIPAA Regulation Hard Drives Artificial Intelligence Router Trends DDoS SSD Live Streaming Voice over Internet Protocol Tech Support Gaming Console IT budget PowerPoint Tablet Troubleshooting Files Analytics Digital Telephone Systems Internet Explorer Data Protection Touchscreen Safety A.I. Gmail Managed Service The Internet of Things Dark Data disposal Remote Support Hard Drive Reporting Scalability Phone System Avoiding Downtime Inventory WhatsApp Wireless Charging Plug-In Gadgets Budget Video Games Google Maps IT Management Sports Knowledge VoIPMyths Worker Cortana Dongle IaaS Edge Remote Control Threat Microsoft Office 365 Movies Profitability Television Information Technology Unified Threat Management Spyware Value Processors Medical IT Credit Cards Smart Technology Amazon Lead Generation Proactive IT Staffing Managed Service Provider Cost Management Tech Terms Comparison VoIPSavings Printer Emergency Bring Your Own Device Telephony HaaS Printer Server Managed IT Authentication Data loss Eliminating Downtime Biometrics Botnet VPN HP Apple GDPR Gadget Hiring/Firing Employer Employee Relationship Update Business Intelligence News Remote Monitoring and Management Multi-Factor Security Streaming Media Specifications Battery Data Management Technology Tips Licensing Hybrid Cloud Voice over IP Cleaning Printers Encryption Email Management Authorization Automobile Staff RAM Wireless Internet Leadership Access Document Management Database iPhone Storage Current Events Shortcut Technology Efficiently Mobile Devices Synergy Telephone System WannaCry Downloads Yahoo Backup and Disaster Recovery Travel Cables Two-factor Authentication Computer Care Sales CrashOverride Websites Physical Security Microsoft Teams Help Desk Paperless Office Tactics WiFi Error Net Neutrality Augmented Reality Hosted Solution Online Shopping Search Scheduling Wireless Technology 5G Server Millennials IBM Machine Learning Emoji Hacker Copy Instagram Google Drive Windows 10 Samsung IT Support G Suite Customer Relationship Management Money File Sharing Competition Telecommute User Tip Big Data IP Address VoIP Paste Mobile Security Customer Service Laptop Spam Blocking Printing User Security Unified Communications Tip of the week Upgrade Mobile Office Domains Operating System Managed IT Services Network Attached Storage Fun Paper Business Technology Remote Computing Public Speaking Environment Server Management Conferencing eCommerce Ink Quick Tips Presentation Virtualization Telecommuting Autocorrect Lithium-ion battery

Newsletter Sign Up