888.678.7282    Get SUPPORT

Strata Information Technology Blog

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Strata Information Technology would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Hackers User Tips Cybersecurity Communications Tech Term Backup Ransomware Software Productivity Business Management Outsourced IT Efficiency Smartphones IT Support VoIP Microsoft Passwords Alert Business Productivity Hardware Email Data Data Recovery Google Browser Innovation Social Media Network Windows 10 Data Backup Communication Small Business IT Services Microsoft Office Cloud Computing Users Collaboration Save Money Hosted Solutions Mobile Device Smartphone Phishing Holiday App Bandwidth Twitter Data Breach Miscellaneous Vulnerability Saving Money Access Control Internet of Things Apps Business Continuity Android Remote Monitoring Scam Facebook Workplace Tips Cybercrime Blockchain Patch Management Government Office 365 Workers Personal Information Settings Wireless Excel Company Culture Mobile Device Management Politics Mobile Devices Networking Wi-Fi Law Enforcement Computer Compliance BDR Applications Employer-Employee Relationship Entertainment Vendor Management Recovery Maintenance Password Website Retail Office Data Security Computers BYOD Medical IT Spam Automation Managed IT Service Managing Stress Chrome SaaS Dark Web Virus Antivirus Information Remote Monitoring and Management Windows Word Virtual Assistant Connectivity Marketing How To Education Gadgets Budget Help Desk Telephone System WannaCry HP Biometrics Error Synergy Data loss Gadget Travel Business Intelligence Regulation Vulnerabilities Sales Yahoo Streaming Media Outlook Technology Tips Hybrid Cloud Healthcare WiFi Cleaning Printers Troubleshooting Physical Security Shortcut Certification Hard Drives HIPAA Document Management Database Leadership Access Touchscreen Router Content Filtering Staff RAM Current Events Live Streaming Reporting Tablet DDoS Downloads Managed Service Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Computer Care Upgrade VoIPMyths Files Net Neutrality CrashOverride Mobility Remote Support Hard Drive Avoiding Downtime Paperless Office Tactics Microsoft Office 365 Gmail Dark Data Websites Microsoft Teams Profitability WhatsApp Wireless Charging e-waste Disaster Recovery Knowledge Artificial Intelligence Trends SSD Voice over Internet Protocol Proactive IT E-Commerce Remote Control Cortana IT budget PowerPoint Gaming Console VoIPSavings Training Processors Digital Internet Explorer Analytics Authentication Unified Threat Management Two-factor Authentication Eliminating Downtime Managed Service Provider Lead Generation Cost Management disposal GDPR Comparison A.I. Scalability Phone System Inventory Payment IT Management Sports Video Games Google Maps Update Emergency Telephony Managed IT Dongle Worker Security Cameras Apple Hiring/Firing Employer Employee Relationship Edge Threat IaaS Authorization Botnet VPN Tech Support Wireless Internet News Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Movies Credit Cards Voice over IP Encryption Amazon Smart Technology Safety instant Messaging Email Management Battery Data Management Tech Terms Staffing Technology Efficiently Licensing Bring Your Own Device Printer iPhone Automobile HaaS Printer Server The Internet of Things Conferencing Unified Communications eCommerce Operating System Competition Network Attached Storage Managed IT Services Customer Relationship Management IP Address Virtualization Paper Big Data Telecommuting Autocorrect Search Online Shopping Scheduling Environment Cryptocurrency Server Management Customer Service Mobile Office Server Ink Millennials Domains Emoji Instagram Google Drive Hosted Solution File Sharing Samsung IT Support Money Public Speaking User Tip Presentation Machine Learning Copy Lithium-ion battery Spam Blocking User Security G Suite Windows 10 Augmented Reality Tip of the week Wireless Technology 5G Telecommute VoIP Fun Mobile Security Paste Business Technology IBM Hacker Wearables Laptop Printing Quick Tips Remote Computing

Newsletter Sign Up