Infracore LLC Blog

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

An analysis of the millions of stolen credentials by security company LeakedSource shows a troubling practice; the most-used passwords are also super easy to guess. In fact, the number one password (connected to more than 120,000 accounts) is “12345.”

Fans of the 1987 Mel Brooks film Spaceballs can see the irony here. In one of the movie’s most quoted scenes, the evil-yet-lovable Dark Helmet is blackmailing King Roland to turn over the password protecting Druidia’s precious atmosphere. Eventually, King Roland caves and reveals the super-secret, super-important password to be, you guessed it, “12345.”

To which Dark Helmet replies, “That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!”

The report from LeakedSource goes on to reveal that the other, most-used passwords are also ridiculously easy to guess; “123456789,” “qwerty,” and “password.”

The fact that Spaceballs came out almost 30 years ago is evidence that using overly simple passwords has been a problem for quite a while, and, as long as there will be passwords, this will continue to be a major issue. Fortunately, the solution is stupidly simple; make sure to use complex passwords with random characters.

Although, using complex passwords is only part of the security equation. For websites and services offering two-factor authentication, like Twitter, you’ll want to take advantage of it. This way, even if a hacker made off with your super-complex password, they’ll still need access to your email account or smartphone in order to log in.

One additional password blunder that’s all too common and easy to avoid is using the same password for multiple accounts. In a major hacking situation like Twitter experienced, even a novice hacker could connect the dots and use the stolen password to try and log into different accounts belonging to the victim.

What kind of a King Roland-like idiot would use the same, super-simple password across multiple online accounts? Well, Facebook’s CEO Mark Zuckerberg for one.

On June 6th, Mark Zuckerberg lost control of his Twitter and Pinterest accounts after a hacker used the same password to access both of them. The super-complex password that stood between a hacker and the King of Social Media, “dadada.” Admittedly, this is a step up from “12345,” but not by much.

To make matters worse, Zuckerberg had used this password before. This highlights yet another best practice when it comes to password security; be sure to routinely change your password, and when you change it, make sure to not use a password that you’ve used before.

Being smart about your passwords will go a long way in protecting your online identity. For your business, it’s wise to take as many security precautions as possible in order to protect your network from hackers looking to steal your company’s sensitive information. To learn more about how Infracore LLC can keep you safe, call us at (858) 509-1970.

Tip of the Week: How to Easily Add a Second Phone ...
3 Talk-to-Text Apps that Get the Job Done
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, December 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Business computing Google Malware Hosted Solutions Microsoft Hackers Innovation Software Data Hardware Business User Tips Internet Tech Term Smartphones Backup Business Continuity Data Backup Browser Email Mobile Devices Windows 10 Computer Android Smartphone VoIP Small Business Communications Business Management IT Services Data Recovery Cloud Computing Productivity Outsourced IT Managed IT Services Alert Workplace Tips Chrome Miscellaneous Office Ransomware Efficiency Managed IT Services Computers Disaster Recovery Network Artificial Intelligence Communication Cybercrime Law Enforcement How To Collaboration Cybersecurity Router Productivity IT Support Money Passwords Office 365 Social Media Password Applications Facebook Virtualization Windows Windows 10 Telephone Systems Internet of Things Google Drive Holiday Work/Life Balance Saving Money Quick Tips Server Upgrade App Word Health Information Gadgets Social Engineering Spam Apps Mobile Device BDR Automation Mobile Device Management Keyboard HaaS Office Tips Data Protection IT Support Voice over Internet Protocol Phishing Scam Data Breach Data Security Microsoft Office Hacking Two-factor Authentication Wi-Fi Mobility Connectivity Vulnerability Private Cloud Bring Your Own Device Managed Service Save Money OneNote Comparison Employer-Employee Relationship Marketing Charger Redundancy Website CES Sports IT Management Telephone System Spam Blocking Battery Patch Management End of Support Avoiding Downtime History Software as a Service Cleaning Content Management IT Plan Operating System Remote Computing Worker Big Data Business Intelligence Computer Care Flexibility Blockchain PDF Unsupported Software Update Remote Monitoring Identity Theft Infrastructure Legal Managed IT Encryption Servers Samsung Automobile Telephony Paperless Office Electronic Medical Records Managed Service Provider Training Windows 7 Bandwidth Government Settings VPN Entertainment USB Value Data Management Human Resources BYOD Google Docs Firewall Networking Public Cloud Data Storage Fraud Virtual Assistant Frequently Asked Questions Business Mangement Unified Threat Management Emergency Public Computer Humor Internet Exlporer Meetings Content Travel Accountants Enterprise Content Management Bluetooth Cortana Thought Leadership MSP Troubleshooting Loyalty Files Start Menu Staff YouTube Help Desk Save Time Search Data storage Audit Virtual Reality Mouse Smart Technology Current Events Hybrid Cloud Instant Messaging Amazon Authentication Excel Gmail Mobile Computing Video Games Audiobook Telecommuting Password Management Physical Security Google Apps File Sharing SaaS Tools Specifications IT solutions How to Experience Computer Fan Worker Commute Sync Smart Office Administrator Two Factor Authentication Knowledge Apple Amazon Web Services Nanotechnology Education Tip of the week Recovery Recycling Camera Internet exploMicrosoft Data loss Remote Work Practices NIST Risk Management Black Market Workers Addiction Augmented Reality Downtime Digital Signature Shortcuts Hiring/Firing Music The Internet of Things Document Management Microchip Network Congestion iPhone webinar Online Shopping Smart Tech Rootkit Windows 10s Computing Infrastructure Windows Server 2008 eWaste Transportation Safety Advertising Scalability Screen Mirroring Hosted Computing Cryptocurrency Politics HBO Cache Remote Worker Books Assessment Relocation User Error Root Cause Analysis Millennials Employer Employee Relationship Wearable Technology FENG Multi-Factor Security HIPAA Search Engine IT Consultant Wireless Conferencing Software Tips Evernote Monitor WiFi Criminal Wireless Internet Warranty Benefits Cast Credit Cards Inventory Safe Mode Outlook Password Manager Wiring Television Best Practice Botnet Workforce HVAC Computer Accessories Wireless Charging Devices Skype Trending Machine Learning Bing Leadership Emails Vendor Management Techology Solid State Drive Users Flash Wire Printer Information Technology Access Control Webinar Twitter CrashOverride Company Culture Compliance Managing Stress Thank You Regulation Printers Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...
Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...