Weston Technology Solutions Blog
Blog posts tagged in Passwords
A recent study from Intermedia found 93 percent of employees engage in at least one form of poor data security. And 23 percent of respondents admitted they would take data from their company if it would benefit them. Long story short, you can have all the technology security in the world, but your biggest vulnerability lies in your people – from regular employees up to managers and owners. What are some of the issues that researchers found?
If you use Dropbox, you may have received an email last month stating that you needed to reset your password. Dropbox is proactively resetting the passwords after account information was recently made public from a 2012 breach where hackers stole the details of over 60 million accounts.
Dropbox is being proactive about this and forcing resets of the passwords is a good start. They also don’t believe that anybody has used the information in the released data to access Dropbox accounts. That being said, security researchers are showing that the hack is real and that the data is easy enough to decrypt that if you use that same password elsewhere, you’ll want to change it. We recommend using a password manager to generate complicated passwords.
A few headlines that we came across recently that are worth sharing.
2015 has come and gone, and a security research firm has published their annual “Worst Passwords” list. Based on leaked password data that has gone public through the year, they have published the 25 worst passwords – is yours on the list?
You can have all the protection you want, but keeping yourself and your company’s data safe online comes down to following some basic security precautions in the way you use the internet, your email, and your computer. In partnership with Microsoft, we have put together a quick 10 question quiz that you can print out to test your employees to make them think about their online actions. While we still encourage a multi-pronged approach that includes managed anti-virus, good backups, strong firewall and content filtering, the last (and most important) line of defense is the user. Print up and pass this quiz around the office, and see how your employees do.