Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Managed Recovery
      • Autopilot
      • Cyber Incident Recovery
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed Detection and Response
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Managed Recovery
    • Autopilot
    • Cyber Incident Recovery
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Author: 11:11 Systems
Date: May 5, 2021

Lord of the Rings, World Password Day, and the keys to well-rounded data security

As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

Let’s start someplace you might not expect: At the “Doors of Durin.” For those who lack this level of nerd knowledge, the Doors of Durin were the western entrance to the great Dwarven kingdom of Khazad-dûm in Lord of the Rings.

If you saw The Fellowship of the Ring, you might remember that the Doors, much like our networks, computers, phones, and online accounts, were password protected. All you had to do was, simply, “speak, friend, and enter.” After a number of failed entry attempts, our heroes realize that this was but a Dwarven riddle, a password hint, and the answer could be found within the question itself. They speak the Elvish word for “friend” and the doors open.

World Password Day

So where are we going with this? Well, with all due respect to the Dwarves, master craftsmen though they may be, their password selection leaves much to be desired. Their choice — a single word, which they wrote on the door itself — went unchanged for centuries and was eventually cracked by a Hobbit. They didn’t even bother to implement two-factor authentication! It was essentially the modern day password Post-it on your monitor.

Of all the beings in Middle Earth, they probably would have benefited most from World Password Day — the first Thursday in May, which has been used to spread awareness about better password habits since 2013.

In our increasingly cyber world, password security is paramount. Passwords represent critical gatekeepers of our digital identities, protecting valuable information for us, our businesses, and our employers. The increase in remote work due to the coronavirus pandemic, along with today’s digital sprawl, makes it all the more important to adopt strong password hygiene and better data security habits overall. It also makes it even tougher for users and IT security teams to manage these necessary passwords, leading to bad habits, data breaches, and worse.

While we recommend the password strengthening strategies generally promoted on World Password Day — such as using unique, complex phrases; frequently changing passwords; and two-factor authentication — they are still, unfortunately, not enough to ensure data security, especially not for businesses or larger organizations.

No-Compromise Data Security With 11:11 Systems

While maintaining strong, unique passwords is an important aspect of modern data security, it barely scratches the surface in terms of the IT protection your organization will need in 2021 and beyond.

For example, a 2018 study found that 74 percent of data breaches start with privileged credential abuse. Meanwhile the frequency, sophistication, and impact of cyberattacks such as ransomware continue to skyrocket — since 2019 the average cost of downtime has increased by 94 percent and that number is only expected to go up.

There is no way to guarantee total immunity to potential data breaches for your organization. In recent years, we’ve seen some of the biggest companies and governments fall victim, despite best efforts. However, by planning, implementing, and testing an in-depth security strategy that is multi-layered, integrated, and ready, organizations can put up a formidable fight, while also drastically limiting the damage done by internal and external cyber threats.

11:11 Systems is a global cloud provider focused on helping you take advantage of all that the cloud has to offer, enabling you to focus on business innovation. Luckily, security has been a critical part of the 11:11 DNA from the very beginning. As internal and external threats evolve, so too does our platform approach to protecting data. 11:11 provides the highest levels of security capabilities and features available today, integrated with all services, and ready to adapt to your ever-increasing security requirements.

Whether you’re interested in Public or Private Cloud (IaaS), Disaster Recovery as a Service (DRaaS), or Cloud Backup as a Service (BaaS), which can include Insider Protection to further protect your organization from internal rogue actors, 11:11 is able to offer the solutions and support you need to protect your data.

To learn more about 11:11 Systems and how to keep your data safe, available, and easy to restore no matter the circumstances, “speak, friend, and enter,” by contacting us today.

Categories: Cloud Compliance, Compliance, Cybercrime, Ransomware, SecurityBy 11:11 SystemsMay 5, 2021
11:11 Systems

Author: 11:11 Systems

Post navigation

PreviousPrevious post:Data Protection at its best – 11:11 Systems and CohesityNextNext post:How secure is your data pipeline?

Related Posts

Managed Security Services
Bring Us Into The Fight
May 26, 2023
Veeam Innovation Award
And the winner is….
May 17, 2023
11:11 Catalyst
More Risk, No Reward
May 5, 2023
Security Assessment
The security assessment: Why it’s crucial for businesses and how to maximize its benefits
April 5, 2023
Security
You Can’t Win: Learning to Live with Security Pessimism
March 13, 2023
Building a Championship-Caliber Data Security Strategy
February 15, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}

https://1111systems.com/wp-content/uploads/2023/04/HPE-video-for-1111-SKO.mp4

https://1111systems.com/wp-content/uploads/2023/04/Dell-Global-Alliance-video-for-1111-SKO.mp4