Password Top Tips

Password Top Tips

share:

81% of hacking-related data breaches involved either stolen or weak passwords.

Recycling the same password across different accounts can be really dangerous. A cyber criminal might steal one of your passwords, and then use it to try and access other accounts. This means they could quickly reset several of your accounts despite only knowing a single password. For example how many systems could be reset once someone gained access to your Email account?

Let’s take a look into some things that can help you, which are available for you to take advantage of right away.

Two-Factor Authentication

Two-factor authentication is becoming a standard for managing access into systems. In addition to traditional credentials like username and password, you have to confirm their identity with a one-time code sent to their mobile device or token (like you do with your bank). The idea is that with two-factor (or sometimes called multi-factor) authentication, should a password be compromised it does not expose your business to any more risk.

Password Policy

Strong and long passwords make it significantly more difficult for hackers to crack and break into systems. Strong passwords are considered over 10 characters in length and made up of both upper and lowercase letters, numbers, and symbols. Do you not use passwords in systems as if one is compromised they all are.

Password Managers

We understand that we are meant to create a unique, difficult passwords for all of our online accounts. However we recognise that this is practically impossible to do without some assistance. Password managers provide that help to make it possible. They’re designed to make using and generating passwords easier and more secure. Many will also automatically enter the username and password into websites and apps on your behalf using browser plugins, so you don’t even have to type them in every time you log in. The best thing is you can securely shared credentials to your whole team and be able to control who has access to what and audit password access!

It’s time to act – a business is only as strong as its weakest link, don’t allow passwords to be it!

 

Drop us a message or give us a call and we will be in touch to help you gain a better understanding

Date: January 5, 2020

Author: Magnetar IT

Inspired to improve your IT? Get in Touch!

Contact Us

Check out our social media: