Out of the Box Solutions Blog

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Out of the Box Solutions would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Productivity Privacy Internet Smartphones Efficiency Cybersecurity Hardware Mobile Device Browser Microsoft Android Communication Malware Ransomware Email Network Small Business IT Support Cloud Data Managed IT services Collaboration Data Backup Innovation Google Passwords Windows 10 Wi-Fi IT Services Mobile Devices Data recovery Internet of Things Communications Applications Wireless Users Holiday Backup Business Management Saving Money Social Media Managed IT Services Workplace Tips Cloud Computing Business Intelligence Employer-Employee Relationship Blockchain Hosted Solutions VoIp Software Marketing Information Business Networking Outsourced IT Hackers Apps Artificial Intelligence Computer Virtual Assistant Password Cost Management Analytics Bandwidth Wireless Charging Managed Service Mobility Cortana Virtualization Compliance VPN Gmail BDR Data Management Remote Monitoring and Management Computers Tech Terms Save Money Access Control Microsoft Office Connectivity Automation Managed IT Service Medical IT Facebook Remote Computing Smartphone Patch Management Technology Tips Error Processors Cables Excel BYOD eCommerce Laptop SaaS Healthcare Managing Stress Troubleshooting Ink Office Twitter Telecommuting Authorization Digital Data loss Router Streaming Media Tip of the week Vulnerability Machine Learning Database Voice over Internet Protocol Knowledge Office 365 Plug-In Wireless Internet Online Shopping Content Filtering GDPR Data Security Environment Phishing Update Government PowerPoint IT Management Inventory Unified Communications Spam Websites Internet Explorer Comparison Training Backup and Disaster Recovery Downloads User Tip Touchscreen Spyware Cybercrime Telephony Proactive IT Help Desk WannaCry Server Management e-waste G Suite Data Breach Outlook Big Data Sports Security Cameras Server Data Protection RAM Workers Edge Virus Safety Threat Specifications Hard Drives Trends Microsoft Office 365 HP Tactics Voice over IP Business Continuity Settings Gadgets Storage HIPAA disposal Bring Your Own Device Sales Profitability Reporting Word Mobile Security Microsoft Teams Millennials Miscellaneous Antivirus Printing SSD A.I. Document Management Telecommute Upgrade IT budget Dark Web Hard Drive Value Hybrid Cloud Tablet Amazon Eliminating Downtime Physical Security Wearables Lead Generation Network Attached Storage Operating System Company Culture Business Technology Staff Dongle Paper Conferencing Movies Authentication Paperless Office Maintenance Analysis Certification Battery Quick Tips Personal Information Disaster Recovery Regulation Alert Printers