Out of the Box Solutions Blog

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

Tip of the Week: How ‘StarWars’ Can Compromise Your Data’s Security

If you think about it, password security is an interesting phenomenon. The odds are that a user knows the importance of using a strong password, as well as the potential consequences of using weak ones. Yet, time after time, people would rather go with passwords that are easy to type and remember, as opposed to adding a few simple security measures.

According to an annual compilation list published by Splashdata, the worst passwords of 2017 were “password” and “123456”. These two security nightmares have been in the #1 and #2 positions, respectively, since at least 2010 - when Splashdata released their first survey. “12345678”, “qwerty” and “12345” round out the top five. The highest ranking newcomer on the list was “starwars”, which debuted at #16. You can find the rest of the 100 Worst Passwords of 2017 here.

A quick Google search of ‘best practices’ for creating a secure password will reveal that there is no shortage of experts and publications that have their own recommendations and guidelines. The following tips were adapted from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. (Note: US-CERT is an entity of the Department of Homeland Security (DHS) that was created specifically for the safety and security of the Internet and to protect against cybersecurity threats.)

Many times, a password will have to meet the security requirements of a specific site or application. Do your best to keep these tips in mind when developing your password.

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

One more thing that Out of the Box Solutions would like to point out is that businesses should never underestimate the importance of stressing Internet security best practices - including password safety - to their employees. Do you have any password or security tips that you’d like to share? Sound off in the comments below.

Improperly Disposing of a Hard Drive Can Threaten ...
North Korea Suspected as Responsible for WannaCry ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Internet Cloud Malware Efficiency Browser Android Productivity Hardware Communication Microsoft User Tips Communications Managed IT services Saving Money Ransomware Email Passwords Small Business Data Business Management IT Support Workplace Tips Applications Users Collaboration Innovation Mobile Device Backup Google Business Intelligence Social Media Blockchain Network Hosted Solutions Wi-Fi Employer-Employee Relationship Mobile Devices Windows 10 VoIp IT Services Artificial Intelligence Bandwidth Virtual Assistant Cost Management Analytics Cloud Computing Outsourced IT Wireless Charging Managed IT Service Data Backup Remote Computing Patch Management Managed IT Services Compliance Virtualization Computer VPN BDR Data Management Computers Cortana Information Data recovery Internet of Things Business Tech Terms Save Money Networking Wireless Gmail Hackers Automation Software Marketing Analysis Battery Facebook Movies Sales Authentication Paperless Office Smartphone Maintenance Gadgets Technology Tips Apps Millennials Error Processors Cables eCommerce Laptop Ink SaaS Password Managing Stress Troubleshooting Managed Service Twitter Tablet Authorization Digital Data loss Router Streaming Media Business Technology Vulnerability Machine Learning Database Voice over Internet Protocol Conferencing Plug-In Online Shopping Government PowerPoint GDPR Environment Update IT Management Inventory Unified Communications Excel Spam Websites Internet Explorer Backup and Disaster Recovery Downloads Touchscreen Spyware Cybercrime Office Proactive IT Sports Telecommuting WannaCry Server Management e-waste G Suite Outlook Big Data Tip of the week Server Data Protection RAM Knowledge Office 365 Edge Virus Safety Threat Settings Hard Drives Trends Phishing Microsoft Office 365 HP Tactics Content Filtering Remote Monitoring and Management Storage HIPAA disposal Bring Your Own Device Comparison User Tip Reporting Mobile Security Microsoft Teams Telephony Miscellaneous Antivirus Printing IT budget SSD A.I. Data Breach Access Control Document Management Telecommute Microsoft Office Connectivity Workers Dark Web Hard Drive Value Hybrid Cloud Specifications Amazon Holiday Physical Security Medical IT Lead Generation Network Attached Storage Operating System Company Culture Voice over IP Staff Dongle Paper Quick Tips Regulation Disaster Recovery Alert Printers