Hackers harvest, weaponize and sell corporate and personal passwords in order to obtain financial reward, damage reputations, steal intellectual property, or for other illegal undertakings. According to cyber security researchers, 80% of hacks involve the theft or reuse of employee passwords.
This is in no small part due to lack of employee education and corporate negligence. Within your organization, advocate for a concerted, company-wide effort around password security and password protection. Here’s how. Share the following password best practices with your peers, clients and prospects.
Password security best practices for everyone
This list starts with password fundamentals that most people are acquainted with and gradually transitions into more sophisticated password security best practices.
- Passwords should be 8-12 characters long. Use a mix of letters, numbers, and symbols.
- Vary with upper case and lower case letters (in applicable languages).
- Avoid recycling the same password across multiple accounts.
- After 90 days, rotate passwords.
- Consider a password manager. Password managers function as digital books of passwords, locked by a master key. If a cloud-based password manager sounds eerie, consider using a local password storage program on your computer (Roboform or PasswordSafe).
- Prioritize longer passwords. The longer the password, the stronger the password.
- Avoid using real words within passwords, as hackers can deploy dictionary attacks, which systematically throw every word in the dictionary against an account’s login portal.
- Complicate your answers to password security questions; avoid using the name of your spouse, children, relatives or pets, as these answers can often be found on your social media profile or elsewhere online.
- Check to see whether or not your passwords have previously been stolen. You can use Mozilla’s Firefox Monitor and Google’s Password Checkup tool to determine which of your email addresses and passwords have been compromised in a data breach. Have I Been Pwned is another good password checker option.
- Secure your phone with a strong password, fingerprint or facial recognition software.
Password security best practices for IT teams
- Limit incorrect login attempts to 5 or fewer.
- Allow passwords to be 64 characters long or longer, rather than limiting the length to 10 characters.
- Apply password encryption. Password encryption offers additional protection.
- Implement multi-factor authentication. Multi-factor or two-factor authentication prevents hackers from accessing your portals or network after cracking simple passwords.
- Deploy privileged access management software for employees with access to sensitive data.
- Ensure that your organization uses up-to-date anti-malware and vulnerability management solutions.
- Adopt the practice of changing corporate account passwords after an employee leaves the enterprise.
- Avoid accessing accounts as ‘root’ or ‘administrator.’ Use your own login and switch user (SUDO) or “run as” in order to execute administration commands.
- Consider disabling root login.Establish password audits. Track your employees’ compliance with the organization’s password security policy. An audit will monitor password modifications in order to ensure compliance. It will also highlight and correct weak access points.
- Send employees password best practices reminders. Employees usually have good intentions, but may forget to update passwords, or to otherwise comply with an organization’s password policy. Send employees email notifications reminding them of policies, best practices and the need to rotate passwords ahead of their expiration.
The stakes are high and the security risks are real. With a compromised password, a hacker could instantly halt your business’s productivity, sink profits, crash your stock price, and engender real-world harm.
Applying password security best practices is as much a choice as locking the doors at night. Keep your people, processes, technologies, partners, clients and IP secure by ensuring that everyone puts password security best practices into action.
Operationalizing behavioral changes can be tough for employees and IT teams alike. But the rewards are worth it and portend to a bright future.
This content by cryptomentor.info is in no way a solicitation or offer to sell cryptocurrencies, securities, shares, financial assets or investment advisory services. cryptomentor.info is not intended to be a source for professional advice. Our content is intended to be used and must be used for informational purposes only and this is not a place for giving or receiving financial advice, advice concerning investment decisions or tax or legal advice. It is very important to do your analysis before making any investment based on your circumstances. Readers should always seek the advice of a qualified professional before making any investment decisions.