Two of the most frequently asked questions that come across my desk are “Do I need to worry about the ‘fill in the blank’ security issue I saw on the news this week?” and “Why do you IT guys always make such a fuss about passwords?” Both questions are more closely related than you may think.
Frequently when a security breach occurs, email addresses, passwords, and other sensitive data are made available on the internet. Security firms get their hands on this data and can run statistical analysis on it; the results are terrifying. According to the firm SplashData, 10% of all users use a password on the top 25 frequent passwords list. The 5 most frequently used passwords from their 2018 list are as follows:
If the above information wasn’t bad enough, many users use the same email address and password for multiple accounts at various places on the internet.
Let me run through two scenarios of what commonly occurs:
Back to the questions from the start of this blog. “Do I need to worry about the ‘fill in the blank’ security issue I saw on the news this week?” The answer to this is yes, you should be worried! If you want to protect yourself and your firm against the security issue, make sure you listen to your IT guy who makes a fuss about passwords. Ensure your users are using long passwords or passphrases, and make sure they are changed on a regular basis. Longer passwords/passphrases rarely show up on frequent password lists, and changing your password frequently ensures that should a breach happen elsewhere, you will have already changed your password.
Have other IT issues at your organization or need a deeper security conversation? Let’s chat!
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.
About the Author
Carl Miller
Carl Miller is a Senior Engineer on the Network Operations Center team. In addition to being a high end technical resource, he configures and manages the technology that automates tasks and prevents issues with our managed services and managed hosting clients. Carl has numerous industry certifications and over 20 years of experience in the IT industry.
Sign up for Insights
Join 14,000+ Business executives and decision makers.
Latest Insights
Microsoft Fabric
Microsoft Fabric for Dynamics 365: What you need to know
December 4, 2025
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Driving efficiency: How Microsoft Dynamics 365 F&SCM out...
December 3, 2025
Security
Why Windows Hello Is More Secure Than You Think: A Defense a...
December 2, 2025
QMS
Accelerating QMS Implementations with CSA, Automation, and A...
December 1, 2025
Information Technology
Phishing Simulations: Why Regular Testing Improves Cyber Res...
November 25, 2025
Information Technology
How Law Firms Can Protect Client Confidentiality in a Digita...
November 24, 2025
Information Technology
The Critical Role of Automation Tools in Endpoint Management...
November 21, 2025
Managed Services
Give Your Identity Strategy the Gift of a Year-End Review
November 20, 2025
QMS
Navigating Generative AI in Life Sciences QMS: Opportunities...
November 19, 2025