Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

An analysis of the millions of stolen credentials by security company LeakedSource shows a troubling practice; the most-used passwords are also super easy to guess. In fact, the number one password (connected to more than 120,000 accounts) is “12345.”

Fans of the 1987 Mel Brooks film Spaceballs can see the irony here. In one of the movie’s most quoted scenes, the evil-yet-lovable Dark Helmet is blackmailing King Roland to turn over the password protecting Druidia’s precious atmosphere. Eventually, King Roland caves and reveals the super-secret, super-important password to be, you guessed it, “12345.”

To which Dark Helmet replies, “That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!”

The report from LeakedSource goes on to reveal that the other, most-used passwords are also ridiculously easy to guess; “123456789,” “qwerty,” and “password.”

The fact that Spaceballs came out almost 30 years ago is evidence that using overly simple passwords has been a problem for quite a while, and, as long as there will be passwords, this will continue to be a major issue. Fortunately, the solution is stupidly simple; make sure to use complex passwords with random characters.

Although, using complex passwords is only part of the security equation. For websites and services offering two-factor authentication, like Twitter, you’ll want to take advantage of it. This way, even if a hacker made off with your super-complex password, they’ll still need access to your email account or smartphone in order to log in.

One additional password blunder that’s all too common and easy to avoid is using the same password for multiple accounts. In a major hacking situation like Twitter experienced, even a novice hacker could connect the dots and use the stolen password to try and log into different accounts belonging to the victim.

What kind of a King Roland-like idiot would use the same, super-simple password across multiple online accounts? Well, Facebook’s CEO Mark Zuckerberg for one.

On June 6th, Mark Zuckerberg lost control of his Twitter and Pinterest accounts after a hacker used the same password to access both of them. The super-complex password that stood between a hacker and the King of Social Media, “dadada.” Admittedly, this is a step up from “12345,” but not by much.

To make matters worse, Zuckerberg had used this password before. This highlights yet another best practice when it comes to password security; be sure to routinely change your password, and when you change it, make sure to not use a password that you’ve used before.

Being smart about your passwords will go a long way in protecting your online identity. For your business, it’s wise to take as many security precautions as possible in order to protect your network from hackers looking to steal your company’s sensitive information. To learn more about how Total Tech Care can keep you safe, call us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Save Money Cloud Computing Data Recovery Office Server Passwords Windows 10 Social Media Chrome Virtualization Gadgets Saving Money Holiday Tech Term Automation Microsoft Office Managed IT Services Managed Service Operating System Cybercrime Computers Artificial Intelligence Facebook Hacking Health Internet of Things BYOD Wi-Fi Mobile Device Management Networking IT Support Managed Service Provider Information Technology Remote Spam Alert Information Office 365 Telephone Systems Covid-19 Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Encryption Big Data Applications Human Resources Law Enforcement Mobile Computing Remote Monitoring Application Password Data Breach Money App History VPN How To Government Remote Computing Blockchain Private Cloud Paperless Office Data Storage Patch Management Mobile Office Managed IT Apps Office Tips Training Data Security Gmail Google Drive Settings Avoiding Downtime Two-factor Authentication Flexibility Marketing WiFi Mouse HaaS IT solutions Entertainment Vulnerability Website Budget Windows 7 Word Bring Your Own Device Data Management Work/Life Balance Infrastructure Servers Voice over Internet Protocol Wireless Lithium-ion battery Education Physical Security RMM Safety Data Protection Sports HIPAA Redundancy Firewall Keyboard Virtual Reality Apple Social Telephone System Staff Software as a Service Conferencing User Error Save Time Machine Learning Scam USB Meetings Remote Work Connectivity Vendor Cleaning Managed Services Display Risk Management Vendor Management Hacker End of Support The Internet of Things Employee/Employer Relationship SharePoint Compliance Remote Worker OneNote Internet Exlporer Computer Care Cryptocurrency Computing Current Events Telephony PDF Samsung Customer Service Environment Comparison Virus Proactive IT Value Fax Server CES Digital Signage Spam Blocking Best Practice Electronic Medical Records Unified Threat Management Computer Accessories SaaS YouTube Business Technology Content Management Black Market Hiring/Firing Access Control Procurement Workplace Strategy Virtual Assistant Net Neutrality Network Congestion eWaste Document Management Authentication Printer Solid State Drive Help Desk Wireless Technology Bluetooth Printing How to Downtime Business Intelligence Data storage Update Audit Wearable Technology Worker Automobile Managed Services Provider IT Management Retail Hard Drives IT Consultant Instant Messaging Database Google Docs Computing Infrastructure Identity Theft Robot Excel Botnet Remote Workers IT Plan Going Green Biometrics Humor Virtual Desktop Processor Unsupported Software Augmented Reality Battery Fraud DDoS Shadow IT Charger Hard Drive Legal Copiers Smart Tech 5G Sync Trending Emails Advertising Amazon Distributed Denial of Service Customer Relationship Management Best Available Quick Tip Politics Addiction WIndows 7 Ergonomics Analyitcs Recycling Smartwatch Netflix Notifications Two Factor Authentication Programming Wiring Development Practices OLED Virtual Machine Amazon Web Services Root Cause Analysis PCI DSS Cache Music 2FA Safe Mode Fiber Optics Criminal Employee HBO Knowledge Antivirus GDPR Messaging Hosted Computing Cabling Skype Relocation Hypervisor Online Shopping Data loss Policy Windows 8 Wireless Internet Troubleshooting User Dark mode File Sharing PowerPoint Trend Micro Video Games Windows Media Player Outlook Leadership IT service Camera SMS Worker Commute Inventory Default App Start Menu Specifications Saving Time Evernote Screen Mirroring Loyalty Procedure Tablet Experience Wire Books Managing Stress dark theme Shopping Scalability Google Search Frequently Asked Questions Travel Domains Windows 10s Printers AI Business Owner IT Infrastructure Mobile Millennials Smart Office Cameras Wireless Charging Bing Cast IaaS NarrowBand Maintenance FinTech Emergency Bloatware Social Network Search Tip of the week webinar Workforce Public Cloud Employer Employee Relationship Virtual Private Network Investment Professional Services iPhone Employee/Employer Relationships Cables Assessment Employees Tablets Windows 365 Entrepreneur ISP Windows Server 2008 Files Telecommuting Project Management Video Conferencing Nanotechnology ROI Tools Printer Server Bitcoin Cortana Shortcuts Chromecast Television Shortcut Sales Point of Sale Cost Management Personal Digital Signature Cryptomining Colocation Uninterrupted Power Supply Social Networking Warranty Supply Chain Management HVAC Batteries Google Apps Public Computer Monitoring Transportation Windows 8.1 Digitize Analysis Regulations Monitor Computer Fan Running Cable Rootkit Administrator Devices Windows Server 2008 R2 Enterprise Content Management Customer relationships Memory Streaming Media Benefits Email Best Practices MSP IT Assessment Accountants Manufacturing Reputation Workers Credit Cards FENG Tech Support Microchip Content Thought Leadership Password Management Managed IT Service Techology Password Manager Security Cameras Laptop IBM Computer Tips Smart Technology Virtual CIO OneDrive Biometric Security Flash Customers Multi-Factor Security Search Engine Consultant Peripheral Science Audiobook Twitter NIST Analytics Using Data Business Mangement Software Tips Touchpad Supercomputer Digital Security Cameras

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code