Highlights
Highlights
Two of the most frequently asked questions that come across my desk are “Do I need to worry about the ‘fill in the blank’ security issue I saw on the news this week?” and “Why do you IT guys always make such a fuss about passwords?” Both questions are more closely related than you may think.
Frequently when a security breach occurs, email addresses, passwords, and other sensitive data are made available on the internet. Security firms get their hands on this data and can run statistical analysis on it; the results are terrifying. According to the firm SplashData, 10% of all users use a password on the top 25 frequent passwords list. The 5 most frequently used passwords from their 2018 list are as follows:
If the above information wasn’t bad enough, many users use the same email address and password for multiple accounts at various places on the internet.
Let me run through two scenarios of what commonly occurs:
Back to the questions from the start of this blog. “Do I need to worry about the ‘fill in the blank’ security issue I saw on the news this week?” The answer to this is yes, you should be worried! If you want to protect yourself and your firm against the security issue, make sure you listen to your IT guy who makes a fuss about passwords. Ensure your users are using long passwords or passphrases, and make sure they are changed on a regular basis. Longer passwords/passphrases rarely show up on frequent password lists, and changing your password frequently ensures that should a breach happen elsewhere, you will have already changed your password.
Have other IT issues at your organization or need a deeper security conversation? Let’s chat!
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.
About the Author
Carl Miller
Carl Miller is a Senior Engineer on the Network Operations Center team. In addition to being a high end technical resource, he configures and manages the technology that automates tasks and prevents issues with our managed services and managed hosting clients. Carl has numerous industry certifications and over 20 years of experience in the IT industry.
Sign up for Insights
Join 14,000+ Business executives and decision makers.
Latest Insights
Insurance
AI’s Transformative Impact on Insurance: Reflections f...
November 13, 2025
Security
Passkeys: The Future of Digital Security
November 11, 2025
NetSuite
How to Rethink Customizations When You Move from Dynamics GP...
November 10, 2025
Information Technology
Microsoft Phone Link: Why You Should Care and How to Get Sta...
November 7, 2025
Insurance
MGA Compass: Your Blueprint to Building a Successful MGA
November 6, 2025
QMS
Biopharma Giant Streamlines Infrastructure with archiveIQ® ...
November 5, 2025
Information Technology
IT Horror Stories: Ignoring the Warning Signs
November 4, 2025
ERP
The Cost of Standing Still with Legacy ERP
November 3, 2025
Cloud
Is Cloud Storage Safe for Law Firms?
October 31, 2025
Life Science
The Haunting of Finance Teams: 5 Frights Life Sciences Leade...
October 30, 2025