We’ve posted before about the importance of strong passwords that follow best practice rules. Over the weekend, arguably one of the biggest players in the tech world had their account hacked.
Mark Zuckerberg, of Facebook fame, had his Twitter, Pinterest, and Instagram accounts broken into over the weekend. The hacker posted to Zuckerberg’s twitter on Sunday, claiming to have gained access to his password via the LinkedIn account information that was posted online a few weeks ago.
A group called OurMine Team took credit for the hack, posting on Zuckerberg’s Twitter “You were in LinkedIn Database with password ‘dadada’." Just to comment, the password dadada is terrible, maybe Zuckerberg should follow his own company's advice on password security.
Other celebrities including Keith Richards and members from the band Tenacious D were also compromised.
If it’s true that these breaches were related to the recently leaked database of LinkedIn accounts, it highlights why it’s important to use different passwords for different accounts and follow best practices when it comes to password security.
If you have a LinkedIn account and you haven’t already changed your password since the account information leak, now is a good time to do just that!
It might seem trivial to worry about your social media accounts, but the issue is when you’re using the same password for everything, once someone has your password they have the key to everything. Bank accounts and sensitive company data are things you don’t want falling into the wrong hands!
Passwords should be complex and difficult to guess. You definitely should avoid these top 3 worst passwords from 2015:
If you are worried about remembering all your different passwords, using a password manager like LastPass or 1Password will allow you to have multiple strong passwords that will help to keep your data secure.
Data security is a growing concern for businesses and one that should be taken seriously. A Disaster Recovery Plan (DR Plan) is a process and a set of procedures put in place to protect and ultimately recover your entire IT environment in the event of a disaster. The plan not only outlines how to protect and recover data, but how to get your business online and working again in the shortest amount of time.