Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Out of the Box Solutions would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Network Security Hardware Cybersecurity Internet Ransomware Business Computing Smartphones Android Technology Email Wi-Fi Applications Malware Cortana Microsoft Passwords Windows 10 IT Support Computers Cloud Save Money Backup Remote Computing Data Saving Money Wireless Charging Managed IT services Employer-Employee Relationship Small Business VPN Data Management IT Services Business Mobile Devices Communications Tech Terms Outsourced IT Facebook eCommerce Network Attached Storage Patch Management Managed IT Services Paperless Office Social Media Virtual Assistant Smartphone Bandwidth Productivity Laptop Twitter Online Shopping Password Tip of the week Digital Data loss Government Phishing Innovation Efficiency Comparison User Tip Browser WannaCry Spam BDR Data Breach Blockchain Software Settings Server Management Specifications HIPAA Virus Edge Marketing Sales Wireless Communication Hard Drive Antivirus Hackers Managed IT Service IT budget Tablet Conferencing Battery Automation Processors Staff Technology Tips Excel Business Management Computer Office Artificial Intelligence Vulnerability Cloud Computing Telecommuting Analytics Data Backup Office 365 Knowledge Content Filtering Virtualization Machine Learning Spyware Websites Business Intelligence Backup and Disaster Recovery Telephony IT Management Gmail Server HP Safety Workers Big Data VoIp Hard Drives Voice over IP User Tips Networking Millennials SSD Holiday Document Management Lead Generation Telecommute Dongle Physical Security Business Technology Inventory Data Protection Data recovery Mobile Security Gadgets Users