Skip to content
iland Cloud Official Site
iland Cloud Official Siteiland Cloud Official Site
  • Why iland
    • Submenu
      • Column 1
        • iland secure cloud console
          Secure Cloud Console
          iland compliance
          Compliance
          iland proven technology
          Cloud Platform
          iland pricing
          Pricing

      • Column 2
        • iland Security
          Security
          iland global regions
          Cloud Regions
          iland networking
          Cloud Connectivity
          iland interactive tour
          Interactive Tour

      • WHY CHOOSE iland
      • OverviewYour business is unique, your cloud should be too.
      • About ilandThe making of a market leader.
      • LeadershipMeet our experienced & knowledgeable executive team.
      • News & MediaFind out what’s new and happening at iland.
      •  
      • CareersYour future starts here. Join the #ilandlife today.
      • Technology PartnersGreat partnerships are built on great technologies.
      • Customer StoriesDiscover why customers are choosing iland Cloud.
      • BlogTips, tricks, opinions, and news from iland experts.
  • Products & Services
    • Products & Services
      • PRODUCTION HOSTING
      • Secure Cloud Overview
      • Secure Public CloudRun VMware natively. No refactoring required.
      • Secure Private CloudDedicated cloud for performance and security.
      • Object StorageS3-compatible storage for long-term retention.
      • BACKUP
      • Secure Backup Overview
      • Secure BackupSecure cloud backup for no-compromise data protection
      • Microsoft 365Complete data protection for Microsoft 365
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS with VeeamSimplified Disaster Recovery for your unique business
      • DRaaS with ZertoContinuous availability for 24×7 IT resilience
      • AutopilotFully-managed disaster recovery as a service.
      • DRaaS for Physical ServersReplicate physical servers to iland.
      • MANAGED SECURITY
      • Managed Security Overview
      • Continuous Risk ScanningDiscover and monitor vulnerabilities
      • Managed SIEMManaged security information and event management
      • Managed EDRManaged endpoint detection and response
      • Managed FirewallSimplify and improve network edge security
      • SUPPORTING SERVICES
      • Cloud Labs
      • Cloud Connectivity
      • Colocation/Bare-Metal
      • Managed Services
      • Migration Services
      • 24x7x365 Support
      • Strategy, Assessment & Planning
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
      • Column 2
        • iland Health Solutions

          Keep IT healthy.

          See our healthcare expertise.

          What's next in finance?

          Transform & modernize your IT.
          Learn More
          Learn More
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Login to Portal
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • Whitepapers
      • Podcast
      • Datasheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Success Center
      • API Documentation
Search:
  • Console Login
  • Contact Us
Header Right Menu
Free Trial
  • Why iland
    • Secure Cloud Console
    • Compliance
    • Cloud Platform
    • Pricing Model
    • Security
    • Cloud Regions
    • Cloud Connectivity
    • Interactive Tour
    • WHY CHOOSE iland
    • OverviewYour business is unique, your cloud should be too.
    • About ilandThe making of a market leader.
    • LeadershipMeet our experienced & knowledgeable executive team.
    • News & MediaFind out what’s new and happening at iland.
    •  
    • CareersYour future starts here. Join the #ilandlife today.
    • Technology PartnersGreat partnerships are built on great technologies.
    • Customer StoriesDiscover why customers are choosing iland Cloud.
    • BlogTips, tricks, opinions, and news from iland experts.
  • Products & Services
    • PRODUCTION HOSTING
    • Secure Cloud Overview
    • Secure Public CloudRun VMware natively. No refactoring required.
    • Secure Private CloudDedicated cloud for performance and security.
    • Object StorageS3-compatible storage for long-term retention.
    • BACKUP
    • Secure Backup Overview
    • Secure BackupSecure cloud backup for no-compromise data protection
    • Microsoft 365Complete data protection for Microsoft 365
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS with VeeamSimplified Disaster Recovery for your unique business
    • DRaaS with ZertoContinuous availability for 24×7 IT resilience
    • AutopilotFully-managed disaster recovery as a service.
    • DRaaS for Physical ServersReplicate physical servers to iland.
    • MANAGED SECURITY
    • Managed Security Overview
    • Continuous Risk ScanningDiscover and monitor vulnerabilities
    • Managed SIEMManaged security information and event management
    • Managed EDRManaged endpoint detection and response
    • Managed FirewallSimplify and improve network edge security
    • SUPPORTING SERVICES
    • Cloud Labs
    • Cloud Connectivity
    • Colocation/Bare-Metal
    • Managed Services
    • Migration Services
    • 24x7x365 Support
    • Strategy, Assessment & Planning
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Login to Portal
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact Us
  • Console Login
  • Free Trial
Author: iland
Date: May 5, 2021

Lord of the Rings, World Password Day, and the keys to well-rounded data security

Let’s start someplace you might not expect: At the “Doors of Durin.” For those who lack this level of nerd knowledge, the Doors of Durin were the western entrance to the great Dwarven kingdom of Khazad-dûm in Lord of the Rings.

If you saw The Fellowship of the Ring, you might remember that the Doors, much like our networks, computers, phones, and online accounts, were password protected. All you had to do was, simply, “speak, friend, and enter.” After a number of failed entry attempts, our heroes realize that this was but a Dwarven riddle, a password hint, and the answer could be found within the question itself. They speak the Elvish word for “friend” and the doors open.

World Password Day

So where are we going with this? Well, with all due respect to the Dwarves, master craftsmen though they may be, their password selection leaves much to be desired. Their choice — a single word, which they wrote on the door itself — went unchanged for centuries and was eventually cracked by a Hobbit. They didn’t even bother to implement two-factor authentication! It was essentially the modern day password Post-it on your monitor.

Of all the beings in Middle Earth, they probably would have benefited most from World Password Day — the first Thursday in May, which has been used to spread awareness about better password habits since 2013.

In our increasingly cyber world, password security is paramount. Passwords represent critical gatekeepers of our digital identities, protecting valuable information for us, our businesses, and our employers. The increase in remote work due to the coronavirus pandemic, along with today’s digital sprawl, makes it all the more important to adopt strong password hygiene and better data security habits overall. It also makes it even tougher for users and IT security teams to manage these necessary passwords, leading to bad habits, data breaches, and worse.

While we recommend the password strengthening strategies generally promoted on World Password Day — such as using unique, complex phrases; frequently changing passwords; and two-factor authentication — they are still, unfortunately, not enough to ensure data security, especially not for businesses or larger organizations.

No-Compromise Data Security With iland

While maintaining strong, unique passwords are an important aspect of modern data security, it barely scratches the surface in terms of the IT protection your organization will need in 2021 and beyond.

For example, a 2018 study found that 74 percent of data breaches start with privileged credential abuse. Meanwhile the frequency, sophistication, and impact of cyberattacks such as ransomware continue to skyrocket — since 2019 the average cost of downtime has increased by 94 percent and that number is only expected to go up.

There is no way to guarantee total immunity to potential data breaches for your organization. In recent years, we’ve seen some of the biggest companies and governments fall victim , despite best efforts. However, by planning, implementing, and testing an in-depth security strategy that is multi-layered, integrated, and ready, organizations can put up a formidable fight, while also drastically limiting the damage done by internal and external cyber threats.

iland is a global cloud provider focused on helping you take advantage of all that the cloud has to offer, enabling you to focus on business innovation. Luckily, security has been a critical part of the iland DNA from the very beginning. As internal and external threats evolve, so too does our platform approach to protecting data. iland provides the highest levels of security capabilities and features available today, integrated with all services, and ready to adapt to your ever-increasing security requirements.

Whether you’re interested in Secure Public or Private Cloud (IaaS) , Secure Disaster Recovery as a Service (DRaaS) , or Secure Cloud Backup as a Service (BaaS) , which can include Insider Protection to further protect your organization from internal rogue actors, iland is able to offer the solutions and support you need to protect your data.

To learn more about iland and how to keep your data safe, available, and easy to restore no matter the circumstances, “speak, friend, and enter,” by contacting us today.

Categories: Cloud Compliance, Compliance, Cybercrime, Ransomware, SecurityBy ilandMay 5, 2021

Author: iland

iland has been helping customers transform their mission critical applications to the Secure Cloud for hosting, protection, and recovery for over two decades. During that time, we have learned a great deal about exceeding customer expectations from every aspect of the cloud journey.

Post navigation

PreviousPrevious post:Data Protection at its best – iland and CohesityNextNext post:How secure is your data pipeline?

Related Posts

What Our Customers Have to Say About 2022’s Most Pressing Cloud Challenges
June 10, 2022
Ready or Not, Cybercrime is on the Rise. Wouldn’t You Rather Be Ready?
May 16, 2022
Bolster Protection with Managed Security Services
April 28, 2022
Surviving the Data Protection Horror Show
November 4, 2021
October is Cybersecurity Awareness Month
October 12, 2021
Summer is Here and Data Still Needs to be Protected
July 14, 2021
iland, an 11:11 Systems Company
PRODUCTS & SERVICES
  • Secure Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Cloud Connectivity
  • 24x7x365 Support
  • Compliance
  • Free Trials
COMPANY
  • Why iland
  • Cloud Platform
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD LOCATIONS
  • Dallas, TX
  • Los Angeles, CA
  • Northern Virginia
  • Toronto, Canada
  • London, UK
  • Manchester, UK
  • Amsterdam, NL
  • Singapore
  • Melbourne, AU
  • Sydney, AU
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2022 iland™ All Rights Reserved | Privacy Notice

Go to Top