Share this
Passwords: 7 Security Mistakes
by Arianna Carter on Jun 6, 2016 9:26:53 AM
Imagine leaving for work in the morning and leaving your front door not only unlocked, but wide open – with your valuables in plain sight and a welcome mat practically inviting anyone to walk in. Pretty unrealistic, right? We instinctively lock our doors, close our windows, and maybe even set an alarm system because we understand how important it is to protect what matters most. Securing our valuables and the things in our home is very important to all of us, so why don’t we treat our cybersecurity the same way? Your digital life deserves the same level of protection and vigilance as your physical home, because in many cases, the data on your devices is even more valuable than the items in your living room.

We live in a world driven by technology. The average internet user manages about 10 different accounts, ranging from work-related applications and remote access portals to banking, email, and social media. We store everything from financial records and medical documents to business-critical files and client data on our computers and devices.
Why your digital information is so critical
In many cases, this digital information is the backbone of how we work and live day to day, which makes it absolutely essential that it stays as secure as possible.
The real-world impact of exposed data
When that data is exposed, the impact can be far-reaching. Data breaches can wreak havoc on your personal and professional life. An intruder gaining access to critical information can lead to identity theft, fraudulent transactions, unauthorized access to business systems, and reputational damage. Files can be duplicated, encrypted, deleted, or stolen outright, and in a business environment this can mean downtime, lost revenue, and potential compliance violations.
The hidden costs of recovery
Even if you recover access, the process of investigating, restoring data, and rebuilding trust can be time-consuming and costly—especially for small businesses and managed service providers responsible for protecting multiple clients.
#1 cause of data breaches is poor passwords
Studies show the number one reason for data breaches is a poor password. Passwords, similar to a lock on our front door, are the first line of defense against intruders and hackers. When that “lock” is weak, it doesn’t take much effort for someone to walk right in—whether that’s a cybercriminal running automated tools or a bad actor who knows a few basic details about you or your business.
Common Password Mistakes
The most common security mistakes involve passwords that are:
- Easy to guess
- Using personal information that can be looked up (favorite color, favorite sports team, pet’s name, child’s birthday)
- Less than 7–10 characters
- Being used on multiple accounts
- Haven’t been changed in over 3 months
- Don’t have a mix of upper and lowercase characters
- Contain no special characters (numbers, punctuation, and symbols)
Why simple passwords are so easy to crack
If it’s easy for you to think of, someone else can more than likely figure it out too—especially if they have access to your public social media profiles or a list of previously leaked passwords. Attackers routinely use automated “brute force” and “dictionary” attacks that run through millions of common passwords in seconds, so anything simple or reused is essentially an open invitation.Good password security can be difficult, but it’s not impossible.
How to build stronger, more memorable passwords
Coming up with something secure is about finding the right balance between what you can remember and what’s difficult for hackers to guess or crack with automated tools. Our brains remember sequences best when grouped in sets of three or four, so try starting with this in mind. For example, you might:
- Choose a phrase you’ll remember and turn it into a pattern (e.g., “CoffeeAt7Am!” becomes C0ff!At7Am!!).
- Use a mix of unrelated words, numbers, and symbols grouped in clusters (e.g., “River!93-Table?47-Cloud#82”).
- Avoid real names, obvious dates, or anything that can be tied back to you or your business.
When to use a password manager
For many users and organizations, using a reputable password manager is also a smart way to generate and store strong, unique passwords for every account without having to memorize each one. This reduces the temptation to reuse the same password across multiple systems—a common weakness that can quickly turn one compromised account into a much larger incident.
Layering passwords with other security tools
Strong password protection combined with other security tools such as multi-factor authentication (MFA), Antivirus, and NovaBACKUP for your data protection can be an excellent comprehensive strategy. MFA adds an extra verification step—even if a password is stolen, an attacker still needs that second factor to gain access. Antivirus helps detect and block malware that might try to harvest your credentials or encrypt your files.
How NovaBACKUP strengthens your data protection
NovaBACKUP complements these layers by ensuring that, even if an account is compromised or a ransomware attack occurs, your critical data is still protected and recoverable. NovaBACKUP allows you to run jobs as a specific password-protected user, helping you maintain proper access controls, as well as allowing you to create an encryption key to further protect your backup files from prying eyes. By encrypting backup data at rest and in transit, you can significantly reduce the risk that a compromised password or endpoint will expose your sensitive business or client information.
Give us a call at +1 805 579-6700 or talk to a backup expert and start protecting your data today.
Share this
- Pre-Sales Questions (91)
- Tips and Tricks (86)
- Industry News (37)
- Best Practices (34)
- Reseller / MSP (31)
- Security Threats / Ransomware (25)
- Cloud Backup (22)
- Disaster Recovery (21)
- Compliance / HIPAA (20)
- Storage Technology (20)
- Applications (18)
- Backup Videos (15)
- Virtual Environments (12)
- Technology Updates / Releases (7)
- Backup preparation (5)
- Infographics (5)
- Products (US) (4)
- Company (US) (1)
- Events (1)
- Events (US) (1)
- Unternehmen (1)
- November 2025 (1)
- October 2025 (2)
- September 2025 (1)
- August 2025 (1)
- July 2025 (1)
- June 2025 (2)
- May 2025 (2)
- April 2025 (2)
- March 2025 (1)
- February 2025 (2)
- January 2025 (2)
- December 2024 (1)
- November 2024 (2)
- October 2024 (1)
- September 2024 (2)
- August 2024 (1)
- July 2024 (2)
- June 2024 (2)
- May 2024 (1)
- April 2024 (2)
- March 2024 (3)
- February 2024 (2)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- May 2023 (1)
- March 2023 (3)
- February 2023 (2)
- January 2023 (1)
- December 2022 (1)
- November 2022 (2)
- October 2022 (2)
- September 2022 (1)
- July 2022 (1)
- June 2022 (1)
- April 2022 (1)
- March 2022 (2)
- February 2022 (1)
- January 2022 (1)
- December 2021 (1)
- September 2021 (1)
- August 2021 (1)
- July 2021 (1)
- June 2021 (1)
- May 2021 (2)
- April 2021 (1)
- March 2021 (1)
- February 2021 (1)
- January 2021 (1)
- December 2020 (1)
- November 2020 (1)
- October 2020 (1)
- September 2020 (3)
- August 2020 (2)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (2)
- February 2020 (2)
- January 2020 (2)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- August 2019 (1)
- July 2019 (1)
- June 2019 (1)
- April 2019 (1)
- January 2019 (1)
- August 2018 (3)
- July 2018 (2)
- June 2018 (2)
- April 2018 (2)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (1)
- September 2017 (1)
- May 2017 (2)
- April 2017 (4)
- March 2017 (4)
- February 2017 (1)
- January 2017 (1)
- December 2016 (1)
- October 2016 (2)
- August 2016 (3)
- July 2016 (1)
- June 2016 (2)
- May 2016 (6)
- April 2016 (5)
- February 2016 (1)
- January 2016 (7)
- December 2015 (6)
- November 2015 (2)
- October 2015 (5)
- September 2015 (1)
- July 2015 (1)
- June 2015 (2)
- May 2015 (1)
- April 2015 (3)
- March 2015 (3)
- February 2015 (3)
- October 2014 (2)
- September 2014 (5)
- August 2014 (4)
- July 2014 (4)
- June 2014 (3)
- May 2014 (2)
- April 2014 (3)
- March 2014 (4)
- February 2014 (5)
- January 2014 (5)
- December 2013 (4)
- October 2013 (6)
- September 2013 (1)
