Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Out of the Box Solutions would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Network Security Cybersecurity Privacy Technology Tech Term Hardware Communications Smartphones Internet Ransomware Android Email Employer-Employee Relationship Small Business Wi-Fi Mobile Devices Applications Malware Microsoft IT Support Backup Data Business Management Managed IT services Business Intelligence VPN Gmail VoIp Data Management Business IT Services Networking Tech Terms Outsourced IT Patch Management Social Media Virtual Assistant Productivity Innovation Cortana Collaboration Passwords Blockchain Windows 10 Network Computers Internet of Things Wireless Communication Cloud Save Money Managed IT Service Saving Money Remote Computing Computer Cost Management Wireless Charging Artificial Intelligence Internet Explorer Spyware Websites Streaming Media Telephony IT Management Backup and Disaster Recovery Google e-waste Server Threat HP Safety Downloads Workers Big Data Hard Drives G Suite Voice over IP User Tips disposal Printing Trends Millennials SSD Bring Your Own Device Holiday Value Lead Generation Telecommute Document Management Users Physical Security Business Technology Paper Dongle A.I. Facebook Hybrid Cloud eCommerce Network Attached Storage Smartphone Managed IT Services Paperless Office Laptop Ink Bandwidth Movies Twitter Cables Online Shopping Password Database Data loss Tip of the week Digital Phishing PowerPoint Government Inventory Voice over Internet Protocol Efficiency Comparison Cybercrime WannaCry Spam User Tip Browser Data Breach Sports BDR Unified Communications Data Protection Settings Server Management Specifications Software Marketing Tactics HIPAA Virus Edge Sales Data recovery RAM Mobile Security Information Hard Drive Antivirus IT budget Tablet Connectivity Hackers Microsoft Teams Operating System Amazon Battery Automation Conferencing Maintenance Processors Staff Excel Apps Technology Tips Company Culture Workplace Tips Office Router Vulnerability Cloud Computing Telecommuting Analytics Office 365 Knowledge Data Backup Managing Stress Environment Virtualization Machine Learning Content Filtering Proactive IT Remote Monitoring and Management Gadgets Alert Plug-In