Cybersecurity for Business | Part 2
Educating yourself never stops, nor does CyberSecurity for your organization. We hope you take the few minutes to review our security talking points.
In Part 1 of this article, we highlighted some of the challenges of passwords and their management. In Part 2, we would like to focus on what can be done to help improve the process of creating passwords as well as provide insights into the management of them. In Part 1 of this article, we highlighted some of the challenges of passwords and their management. In Part 2, we would like to focus on what can be done to help improve the process of creating passwords as well as provide insights into the management of them.
What can you do? There are several recommendations that will help improve personal and business security. One of the best places to start is with passwords. It is highly recommended that users have a unique, strong password for each login.
What is considered a strong password?
It is recommended to use passwords that contain a combination of lowercase & uppercase letters, numbers, and special characters. Although the Summer18! password meets these criteria, it is easily guessed. To help mitigate this risk, users are asked to create passwords that do not contain:
- Dictionary words
- Significant dates such as birthdates, anniversaries, etc.
To create a strong password, it is recommended to create a passphrase. Once you have a phrase, you can then use that to create a password that is both complicated and difficult to guess while remaining easy to remember.
- Phrase: Tom Brady wears number 12 and plays for the Pats.
- Password: TBw#12&pftP
Taking it to the limit with Password Managers.
Balancing the desire for easy-to-use passwords and requirements of secure passwords is often difficult. Another solution that can help with the stresses of needing so many passwords that are unique are Password managers, such as PassPortal. These tools are designed to help alleviate this issue by storing all your passwords. To access your password vault, a single password is required. Once inside the vault, users can access all their other passwords. To further secure the vault, it can be paired with a multi-factor authentication tool.
We are more than happy to schedule a meeting to discuss all services and solutions as it relates to security for your organization.