Infracore LLC Blog

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

An analysis of the millions of stolen credentials by security company LeakedSource shows a troubling practice; the most-used passwords are also super easy to guess. In fact, the number one password (connected to more than 120,000 accounts) is “12345.”

Fans of the 1987 Mel Brooks film Spaceballs can see the irony here. In one of the movie’s most quoted scenes, the evil-yet-lovable Dark Helmet is blackmailing King Roland to turn over the password protecting Druidia’s precious atmosphere. Eventually, King Roland caves and reveals the super-secret, super-important password to be, you guessed it, “12345.”

To which Dark Helmet replies, “That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!”

The report from LeakedSource goes on to reveal that the other, most-used passwords are also ridiculously easy to guess; “123456789,” “qwerty,” and “password.”

The fact that Spaceballs came out almost 30 years ago is evidence that using overly simple passwords has been a problem for quite a while, and, as long as there will be passwords, this will continue to be a major issue. Fortunately, the solution is stupidly simple; make sure to use complex passwords with random characters.

Although, using complex passwords is only part of the security equation. For websites and services offering two-factor authentication, like Twitter, you’ll want to take advantage of it. This way, even if a hacker made off with your super-complex password, they’ll still need access to your email account or smartphone in order to log in.

One additional password blunder that’s all too common and easy to avoid is using the same password for multiple accounts. In a major hacking situation like Twitter experienced, even a novice hacker could connect the dots and use the stolen password to try and log into different accounts belonging to the victim.

What kind of a King Roland-like idiot would use the same, super-simple password across multiple online accounts? Well, Facebook’s CEO Mark Zuckerberg for one.

On June 6th, Mark Zuckerberg lost control of his Twitter and Pinterest accounts after a hacker used the same password to access both of them. The super-complex password that stood between a hacker and the King of Social Media, “dadada.” Admittedly, this is a step up from “12345,” but not by much.

To make matters worse, Zuckerberg had used this password before. This highlights yet another best practice when it comes to password security; be sure to routinely change your password, and when you change it, make sure to not use a password that you’ve used before.

Being smart about your passwords will go a long way in protecting your online identity. For your business, it’s wise to take as many security precautions as possible in order to protect your network from hackers looking to steal your company’s sensitive information. To learn more about how Infracore LLC can keep you safe, call us at (858) 509-1970.

Tip of the Week: How to Easily Add a Second Phone ...
3 Talk-to-Text Apps that Get the Job Done
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Hackers Malware Software Microsoft Innovation Internet Data Tech Term Smartphones Backup Hardware Email Browser Windows 10 Hosted Solutions Business Continuity Android Business Mobile Devices Computer VoIP IT Services Data Backup Managed IT Services User Tips Alert Small Business Miscellaneous Smartphone Office Ransomware Outsourced IT Business Management Cloud Computing Productivity Computers Workplace Tips Disaster Recovery Communications Artificial Intelligence Efficiency Cybercrime Data Recovery Communication Law Enforcement Network Windows 10 Telephone Systems Internet of Things Router How To Productivity Money Chrome Passwords Collaboration Cybersecurity Social Media Password Applications Facebook Virtualization Windows Managed IT Services Saving Money Quick Tips Upgrade App Health Office 365 Gadgets Social Engineering Work/Life Balance Vulnerability Bring Your Own Device HaaS Spam Office Tips Save Money Server IT Support Holiday Mobile Device Management Microsoft Office Hacking Data Protection Wi-Fi Scam Data Breach Phishing Information Private Cloud Word IT Support Data Security Two-factor Authentication Google Drive Apps Connectivity Automation Windows 7 Entertainment Settings USB Value Telephone System VPN Battery End of Support Sports Firewall Networking History BYOD Fraud Data Storage Remote Computing BDR Employer-Employee Relationship Charger Comparison OneNote Keyboard Website CES Redundancy Patch Management IT Management Flexibility PDF Spam Blocking Avoiding Downtime Cleaning Legal Content Management IT Plan Mobility Automobile Worker Managed Service Provider Operating System Big Data Government Paperless Office Computer Care Business Intelligence Blockchain Unsupported Software Data Management Update Managed Service Identity Theft Remote Monitoring Public Cloud Mobile Device Samsung Virtual Assistant Encryption Managed IT Electronic Medical Records Infrastructure Marketing Bandwidth Training Criminal Instant Messaging Television Data storage MSP Credit Cards Inventory Cast Virtual Reality Computer Accessories Hybrid Cloud YouTube Outlook Video Games Audiobook Workforce Botnet Leadership Password Manager Password Management Trending Human Resources Skype How to Mobile Computing Wireless Charging Devices Emails Vendor Management Google Docs Solid State Drive Flash Emergency Public Computer File Sharing Access Control Worker Commute Bluetooth Apple Business Mangement Frequently Asked Questions Troubleshooting Loyalty Accountants Meetings Travel Education Save Time Internet exploMicrosoft Smart Office NIST Staff Start Menu Black Market Smart Technology Current Events Camera Cortana Thought Leadership Audit Augmented Reality Amazon Authentication iPhone Gmail Excel Scalability SaaS Telecommuting Computing Infrastructure Advertising Document Management Experience Cryptocurrency Specifications Tools Two Factor Authentication Knowledge Relocation User Error Google Apps IT solutions Physical Security Voice over Internet Protocol Computer Fan Sync Wireless Remote Worker Amazon Web Services Nanotechnology Risk Management Servers Recovery Recycling Tip of the week Monitor Remote Work Practices Data loss Hiring/Firing Best Practice Music Safe Mode Digital Signature Downtime Network Congestion Wireless Internet Warranty Workers Addiction The Internet of Things Transportation Safety Wiring Online Shopping Smart Tech webinar Politics Rootkit HVAC eWaste Windows 10s Windows Server 2008 Information Technology Books Assessment Hosted Computing Screen Mirroring Techology Users Employer Employee Relationship Machine Learning Content Wearable Technology Millennials Root Cause Analysis IT Consultant Humor Internet Exlporer Wire Cache HBO Enterprise Content Management Multi-Factor Security HIPAA FENG Telephony Search Benefits Files Unified Threat Management Evernote Conferencing Software Tips WiFi Mouse Company Culture Compliance Thank You Webinar Managing Stress Regulation Congratulations CrashOverride Printers Twitter Printer

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Www.Office.Com/Setup | Microsoft http://Office.Com/Setup :- Office setup suite is an importan...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
Office Support Helpline - http://Www.Office.Com/ Setup :- Get started with your Microsoft Office Ins...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Office.Com/Setup | Office Com Setup :- We offer technical support for Microsoft office setup....