ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It Seems Sony Can’t Get a Break from IT Issues

b2ap3_thumbnail_protect_your_identity_400.jpgIt’s the holiday season… for everyone but Sony, at least. The tech/entertainment supergiant has been experiencing a ton of security issues lately. Last month, someone hacked into Sony’s databases and stole a lot of information (including unreleased movies, which were later released to the world). This December, it was revealed that Sony stored their passwords in a folder on their server titled “Passwords.”

Yes, passwords. Let that sink in for a moment. They could have at least changed it to something a little less conspicuous, like “New Jazz” or something. All of a sudden, it’s not surprising that someone was able to access their systems and steal a bunch of confidential data. Maybe their login username is “admin,” too. More data has been leaking over the past several days, including Social Security numbers, passport copies, and even more personal data from employees and actors involved with Sony. GOP (Guardians of Peace), the group responsible for the hacks, has established that any Sony employee who doesn’t want their information released should email them directly.

While actors Seth Rogen and James Franco have jested about the hacks on Saturday Night Live and social media, this hack is kind of a big deal. It’s safe to say that a high-profile hack of this nature could release plenty of information within due time, and threaten the business continuity of Sony. This is a perfect example of what can happen if you’re nonchalant with your network security. Someone could hack into your server, gain access to your “passwords” folder, and make off with tons of login credentials that could put your business on the chopping block.

However, when dealing with passwords, there are several best practices which you want to consider, all of which are meant to maximize the security of your accounts. Here are some tips to help you get the most out of your passwords and keep your sensitive information safe.

  • Use a complex string of characters, numbers, and symbols. Rather than using simple words like “admin” or “password” for your login credentials, you should use multiple different characters. This includes filling it with numbers and other special symbols, too. The more complex the password, the more difficult it will be for a hacker to log in. For example, instead of using certain letters, you can replace them with numbers which look similar to them.
  • Long passwords are better than short ones. As you can expect, using a password which is short and easy to remember isn’t optimal for security. As previously mentioned, you want a password that is difficult for a hacker to get a hold of. Hackers are able to plug in millions of characters at an incredible rate, so the password must be long in order to keep it convoluted and hidden.
  • Don’t use words that exist. Words that exist are easy to remember and, likewise, easy to guess. Instead, you can make up a word that only you can recognize. This way, it’s unlikely that the hacker will guess it (or at the very least, force them to get creative with their hacks).
  • Avoid easily-obtainable information. One way that people try to mask their password is by using their Social Security number or date of birth. Just because you think they’re secure doesn’t mean others can’t get their hands on them, too. Even worse, if someone were to keylog your password, and it’s your Social Security number or date of birth, that hacker is one step closer to stealing your identity.
  • Use several different passwords. This should be obvious, but you shouldn’t use the same password for multiple accounts. If one password works for multiple accounts, the hacker only needs to crack the code once to get to all of your other accounts. You want your passwords to be as different as possible.

Password Management Solutions from ClearView IT
There’s one thing which all of these tips point toward: making your password difficult to guess, and therefore, practically impossible to remember. When you have so many complex passwords, it’s hard to remember which password goes where. This is where use of ClearView IT’s preferred password management solution can truly shine. All of your passwords are gathered in one location inside an application. The password manager then pulls the password whenever you need to access an account.

Granted, you could always just write down your passwords and put them all in one place, but then you’re doing the exact same thing that Sony did. If someone were to access the notebook or post-it note with your passwords written in it, you can say goodbye to your sensitive information. Whatever you do, do not label the list as a bunch of passwords.

For information on how to integrate a password management system into your technology strategy, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Business Continuity Windows 10 Facebook Disaster Recovery Passwords Holiday Covid-19 Managed Service IT Support Apps Windows 10 Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Workplace Strategy Networking Artificial Intelligence Windows Gadgets Managed IT services Spam Server Mobile Device Management Bandwidth WiFi Encryption Blockchain Remote Business Technology App Virtualization Information Office 365 Budget Apple Information Technology Employee/Employer Relationship Gmail Office Two-factor Authentication History Wi-Fi Health Access Control Data Security Analytics Cybercrime BDR Big Data Conferencing Voice over Internet Protocol Vendor Hacker Patch Management Remote Computing Cost Management Compliance Remote Monitoring Document Management Help Desk IT Management Hacking Training Save Money Employer-Employee Relationship Retail Mobile Office Applications Alert Money BYOD Managed Services Hiring/Firing Vulnerabilities Outlook Computing Customer Service Unified Threat Management Vendor Management Firewall Password Hard Drive Project Management Augmented Reality Word IBM Data loss Legal Website Data storage Search... Best Practice Remote Workers Black Market Update Cleaning Windows 7 Robot Free Resource User Monitoring Social Sports How To DDoS SaaS Paperless Office Antivirus Healthcare Maintenance Chrome iPhone Cortana Twitter Education Content Filtering Law Enforcement Websites End of Support Mobile Computing Printer Meetings Router Mobility Marketing Google Maps The Internet of Things Running Cable Windows 11 Scam YouTube Travel Storage Virtual Reality Social Engineering VPN Data Breach Laptop Cryptocurrency Tech Terms Processor Managed IT Downtime Managed Services Provider Safety Digital Virtual Private Network Politics Machine Learning HIPAA Settings Virtual Desktop Taxes Experience Current Events Solid State Drive Multi-factor Authentication Solutions Physical Security Integration Saving Time Chromebook Images 101 Drones Disaster Display Automobile Computers Bitcoin Telephone Lithium-ion battery How To PowerPoint Start Menu Employees Computer Care Avoiding Downtime Downloads Administration Microchip Flexibility Vulnerability Presentation Holidays Processors Specifications Excel Software as a Service IT Consultant Cooperation Hack Identity Theft Data Protection Video Conferencing Notifications Customer Relationship Management Unified Communications Co-Managed IT Virtual Machines Google Docs Computer Repair Entertainment Virtual Assistant Bluetooth Professional Services Distributed Denial of Service Office Tips Wireless Technology Private Cloud Memory eWaste Workplace Health IT intranet Botnet Equifax Tablet G Suite Memes Micrsooft Tracking Net Neutrality Wireless Shortcut Mouse Tactics Rental Service VoIP Human Resources Hard Drive Disposal Flash Financial Data Heating/Cooling Username Environment Scams Social Networking Startup Troubleshooting Telephone Systems Risk Management Freedom of Information Windows XP Business Growth Web Server IT Digital Payment Navigation SharePoint Addiction Google Apps email scam Mobile Security Worker Telework Microsoft 365 Cables User Tip Legislation Banking Access Smartwatch News Google Wallet Communitications Deep Learning Public Cloud Procurement Evernote Network Management Messenger Time Management FinTech Point of Sale Proxy Server Audit Emails Business Owner Business Metrics Spyware CES Fake News Hosted Solution IT Assessment Computing Infrastructure File Sharing Supply Chain Management Staffing Value Service Level Agreement Books Management Redundancy Device security Language Organization Society Cyber security IP Address Shortcuts Smart Devices Wireless Headphones Cache Microsoft Excel Reading Unified Threat Management Business Cards Monitors Workers Remote Working Visible Light Communication Tech Going Green Be Proactive Error AI Windows 8 Trend Micro CCTV Electronic Health Records Transportation Bookmark Printing Inbound Marketing Digital Security Cameras Relocation Touchscreen Piracy Displays Recovery Advertising Wasting Time Term Competition Download Modem Workplace Strategies Emergency HTML Work/Life Balance Tech Support Computer Malfunction eCommerce Surveillance Browsers Entrepreneur Nanotechnology Vendor Mangement Videos LiFi Software License Samsung Documents Managing Costs Google Play Application Upload Electronic Payment SSID Social Network Business Intelligence In Internet of Things Uninterrupted Power Supply Webcam Network Congestion Development Employer/Employee Relationships Data Analysis Screen Reader Hacks Business Mangement Media Reliable Computing Mobile Technology Phone System Writing Tablets Securty Virtual Machine Security Cameras Trends Smart Technology Customer Resource management Devices Reviews Optimization Domains Supercomputer Teamwork Fileless Malware Google Calendar 2FA Tip of the week Scalability Virus Company Culture Data Storage Hypervisor Gamification Medical IT Telephone System Administrator Regulations Text Messaging Shopping Proactive IT Motion Sickness SQL Server Directions Comparison Backup and Disaster Recovery Bring Your Own Device Google Drive Paperless Computer Accessories Desktop PCI DSS Licensing Public Speaking Content Supply Chain Electronic Medical Records Knowledge Accountants Corporate Profile Gig Economy Streaming Media Music Humor Employer Employee Relationship Internet Service Provider Azure Keyboard Television Database Telephony Business Communications Cabling Regulations Compliance Managed IT Service Hard Drives

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?