Mytek Logo
MyTek Logo

Sorry Han, When it Comes to Security, You Need Phoenix IT Solutions

by | May 4, 2018 | Miscellaneous, MyTek Blog


Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

If you haven’t heard of Star Wars, you must be living in a cave. The characters, the storylines, and the technology have been a big drawing point for fans around the world for the past 40+ years. But, did you know that Star Wars shares amazing lessons about IT security with its audience? If only Han Solo had shared the wisdom of Obi Wan, they would have reached out and gotten the help of IT solutions. For Phoenix small businesses, IT solutions are necessary for those who know the value of their systems and data. In today’s article, we’re going to look at three Star Wars plotlines and how proper IT strategies could have saved the day.

A Little Background on Why They Needed Phoenix IT Solutions

If you have never seen Star Wars: A New Hope, the story follows a young man named Luke Skywalker, whose parental guardians are killed by soldiers who were searching for droids that Luke’s uncle once owned. With the help of a hermit, Obi-Wan Kenobi, Luke decides to join the rebellion, which is being run by his sister Leia (but they don’t know they are related just yet).

The Death Star, which is a new type of battle station developed by the Empire, is equipped with super lasers and is the size of the moon. With technology to obliterate several planets, they should have known that they would need high-security IT solutions. This movie’s plot focuses on the Rebellion’s attempt to neutralize the Death Star.


With a team of Luke, Obi-Wan Kenobi, two droids named C-3PO and R2-D2, and Han Solo and Chewbacca, they set out to save Princess Leia from the Death Star, where she is being held captive. We’re going to take a look at the Empire’s security systems and how they were not up to par and let the rebellion save Leia and destroy the battle station.

Unprotected System Security Endpoints

In the movie, Obi-Wan Kenobi is a wanted criminal because of an altercation that happened decades beforehand, so he has to be careful on their journey. When he is stopped by Stormtroopers, he uses Jedi Mind control to get past them. In the real world, there is no mind control, but you should always have authentication protocols to keep your infrastructure and data safe. This includes biometrics, passwords, and other forms of authentication for your employees. Network security is super necessary for Phoenix small businesses because data theft and system hacking are on the rise. With MyTek Network Solutions, your company can protect its data from unwanted guests.

A Complete Lack of Segmentation and Lack of System Encryption

In the movie, once they have gotten into the Death Star, they are able to get into a control room where R2-D2 hacks the system. They do this by hooking him up to the network and he is able to get in and do whatever he wants without any forms of authentication. In real life, you will need to have network segmentation so you have control over who has access to what powers. Your data should also be encrypted so no one can easily get in and access your sensitive data.

Ignoring CISO at Great Peril

Once there was information about the break-in, Grand Moff Tarkin from the Death Star did nothing to prevent it, and laughed as if he thought it could not be true. This overconfidence led to the downfall of his ship and the death of all of his staff who were on board. In real life, vulnerabilities should never be ignored. The longer you wait to patch something, the more time hackers have to get in and take advantage of your data. Your network should always be at the forefront of your security and MyTek can help with this monitoring.

While Star Wars is just a fictional franchise, these lessons apply to the real world. Don’t let your Death Star get taken over and always be on top of your network security. To learn more about the IT solution available to you, call MyTek today at 623-312-2440, and May the 4th be with you!


Tim - Team

Tim Tiller, LMSW

Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.


Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.


Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Generated by Feedzy
Share This