Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

An analysis of the millions of stolen credentials by security company LeakedSource shows a troubling practice; the most-used passwords are also super easy to guess. In fact, the number one password (connected to more than 120,000 accounts) is “12345.”

Fans of the 1987 Mel Brooks film Spaceballs can see the irony here. In one of the movie’s most quoted scenes, the evil-yet-lovable Dark Helmet is blackmailing King Roland to turn over the password protecting Druidia’s precious atmosphere. Eventually, King Roland caves and reveals the super-secret, super-important password to be, you guessed it, “12345.”

To which Dark Helmet replies, “That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!”

The report from LeakedSource goes on to reveal that the other, most-used passwords are also ridiculously easy to guess; “123456789,” “qwerty,” and “password.”

The fact that Spaceballs came out almost 30 years ago is evidence that using overly simple passwords has been a problem for quite a while, and, as long as there will be passwords, this will continue to be a major issue. Fortunately, the solution is stupidly simple; make sure to use complex passwords with random characters.

Although, using complex passwords is only part of the security equation. For websites and services offering two-factor authentication, like Twitter, you’ll want to take advantage of it. This way, even if a hacker made off with your super-complex password, they’ll still need access to your email account or smartphone in order to log in.

One additional password blunder that’s all too common and easy to avoid is using the same password for multiple accounts. In a major hacking situation like Twitter experienced, even a novice hacker could connect the dots and use the stolen password to try and log into different accounts belonging to the victim.

What kind of a King Roland-like idiot would use the same, super-simple password across multiple online accounts? Well, Facebook’s CEO Mark Zuckerberg for one.

On June 6th, Mark Zuckerberg lost control of his Twitter and Pinterest accounts after a hacker used the same password to access both of them. The super-complex password that stood between a hacker and the King of Social Media, “dadada.” Admittedly, this is a step up from “12345,” but not by much.

To make matters worse, Zuckerberg had used this password before. This highlights yet another best practice when it comes to password security; be sure to routinely change your password, and when you change it, make sure to not use a password that you’ve used before.

Being smart about your passwords will go a long way in protecting your online identity. For your business, it’s wise to take as many security precautions as possible in order to protect your network from hackers looking to steal your company’s sensitive information. To learn more about how Total Tech Care can keep you safe, call us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Managed IT Services Windows Phishing Upgrade Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Gadgets Virtualization Saving Money Holiday Social Media Tech Term Managed IT Services Microsoft Office Automation Managed Service Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Networking IT Support Health Remote Spam Alert Office 365 Telephone Systems Covid-19 Information Information Technology Managed Service Provider Social Engineering BDR Mobility Bandwidth Recovery Employer-Employee Relationship Router Big Data Law Enforcement Data Breach Remote Monitoring Mobile Computing Password Money App Application History Encryption Applications Human Resources Remote Computing Private Cloud Mobile Office Managed IT Blockchain Paperless Office Apps How To Office Tips Training VPN Data Storage Patch Management Government Two-factor Authentication Avoiding Downtime Windows 7 Word Mouse Servers HaaS Flexibility Marketing Bring Your Own Device WiFi Data Management IT solutions Data Security Work/Life Balance Entertainment Website Budget Wireless Gmail Infrastructure Google Drive Voice over Internet Protocol Settings Vulnerability Scam Virtual Reality Apple Data Protection Social Vendor Management User Error Save Time Meetings Vendor Cleaning Managed Services Risk Management Software as a Service Display Hacker Telephone System Staff USB Machine Learning End of Support Connectivity Remote Work The Internet of Things Education Physical Security Lithium-ion battery Employee/Employer Relationship Safety RMM Sports HIPAA Redundancy Conferencing Firewall Keyboard Digital Signage YouTube Remote Worker SaaS Audit Worker Black Market IT Management Cryptocurrency Botnet Network Congestion Virus IT Plan eWaste Document Management Procurement Solid State Drive Comparison Net Neutrality Wireless Technology Workplace Strategy Unified Threat Management How to Downtime Help Desk Computer Accessories Unsupported Software CES Printing Charger Data storage Business Technology Wearable Technology Automobile Content Management Access Control Retail Compliance Hard Drives OneNote Computer Care Managed Services Provider Instant Messaging Excel Printer Virtual Assistant Current Events Robot Computing Infrastructure Authentication Database Going Green Bluetooth Telephony Samsung Biometrics Remote Workers Virtual Desktop Battery Value Processor Update Shadow IT DDoS Spam Blocking Legal Electronic Medical Records IT Consultant SharePoint Hard Drive Google Docs Internet Exlporer Hiring/Firing Identity Theft Humor Computing Customer Service PDF Environment Fax Server Proactive IT Augmented Reality Fraud Best Practice Business Intelligence Smart Tech Trend Micro Trending Tablet WIndows 7 Dark mode Experience Addiction SMS Domains Scalability Amazon Default App Procedure Business Owner Public Computer Recycling Saving Time Practices Shopping Maintenance Transportation Google Search NarrowBand Regulations Wiring dark theme IaaS Computer Fan Cache AI Search Rootkit Amazon Web Services IT Infrastructure Bloatware Bing Safe Mode FinTech Criminal iPhone Workers Hosted Computing Social Network Benefits Tablets User PowerPoint GDPR Windows Media Player FENG Wireless Internet Online Shopping Investment Entrepreneur File Sharing Employees IBM Employee/Employer Relationships Files Inventory Shortcut Smart Technology Specifications ISP Chromecast Managing Stress Flash Camera Windows 365 Wire Video Conferencing Evernote ROI Cost Management Travel Shortcuts Uninterrupted Power Supply Cameras Software Tips Sales Supercomputer Bitcoin Social Networking Colocation Emails Personal Millennials Cryptomining Sync Printers Point of Sale Smart Office Supply Chain Management Wireless Charging Monitor Monitoring Running Cable Batteries Netflix Digitize Two Factor Authentication Workforce Memory Virtual Private Network Windows 8.1 Root Cause Analysis Cables Windows Server 2008 R2 Reputation Streaming Media Music Tech Support Printer Server HBO Customer relationships Content Knowledge Nanotechnology IT Assessment Techology Telecommuting Manufacturing Laptop Skype Project Management Email Best Practices Data loss Cortana Customers Troubleshooting Security Cameras Science Outlook Computer Tips Audiobook Leadership Digital Signature Managed IT Service OneDrive Biometric Security Touchpad Start Menu Warranty Virtual CIO Screen Mirroring HVAC Peripheral Loyalty Google Apps Books Frequently Asked Questions Digital Security Cameras Distributed Denial of Service Politics Analysis Using Data Customer Relationship Management Advertising Windows 10s Devices Copiers 5G Analyitcs Mobile Administrator Cast Enterprise Content Management Quick Tip Programming Notifications Emergency Smartwatch Tip of the week MSP Ergonomics webinar Accountants Professional Services Microchip Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Consultant Password Management PCI DSS Antivirus Assessment Password Manager Virtual Machine Relocation Fiber Optics Multi-Factor Security Employee Windows 8 Analytics Windows Server 2008 2FA Tools Search Engine Twitter Messaging IT service Video Games Cabling Best Available NIST Policy Worker Commute Television Business Mangement Hypervisor

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code