Contact Sales: |   Support: | Pay My BillClient SupportLet’s Talk!

9 Rules For Strong Password Creation

Do your employees know how to create a strong password? Is password management a priority at your company?

If you’re answering no to either question, you could be placing your organization at serious risk. Why? Because guessing employee passwords is one of the key ways hackers try to get into your organization. It’s one of the things they try first, before they graduate to more complicated schemes like phishing or link baiting. The reason is obvious. An employee password is like a golden ticket giving cyber criminals full access to anything they’d like in your network—admin codes, customer data, competitive information, and a whole lot more.

Here’s how easily a hacker can implement one of these password scams. Imagine, for a moment, that a hacker has obtained an employee email address off your website, or through a mailing list, or through some kind of hack. All they have to do is find the link to your employee log-in page. If that employee has an easily guessed password like “password” or “myname123,” a hacker can literally walk right through the front door of your network, completely undetected.

Password management is simply job #1 for your company, your IT department, and your employees, every day.

Password Rules: A Few Simple Standards

Fortunately, password rules are simple and easy to teach. Password rules for your organization don’t have to be complicated. It’s so simple, in fact, that our nine rules are actually an acronym—GET STRONG.

– GET RID OF PASSWORDS WRITTEN ON PAPER. Lost or misplaced sticky notes are a boon to thieves.
– ESCAPE COMPLEXITY Even though the password rules may be complicated, try to create them so they are easily remembered.
– TEACH EMPLOYEES Make sure all employees know and follow password rules and requirements.
– SIZE MATTERS Longer passwords are harder to hack, so all passwords should be a minimum of 8 characters. System passwords should be between 12 and 50 characters in length.
– TRUST NO ONE Add authentication processes to logins, such as Google Authenticator, Duo, RADIUS tokens, or other 2-factor options.
– ROTATE OFTEN Users should change their passwords every 90-180 days.
– OMIT DUPLICATES Never use the same password across multiple applications, systems and accounts.
– NO CHEATING  Disable password hints.
G – GET A VAULT Store passwords in secure, encryption.-enabled vaults such as 1Password.

More Resources on Passwords and Cybersecurity

Password rules are the first steps in protecting your data, files and devices from unauthorized access. But there’s more to know. Check out our password security tips in our Two-Factor Authentication ebook. We’ve also just written a blog about the latest in password encryption, Single Sign-on authentication, and how it can hack proof your organization. And of course, one of the best things you can do for your company’s security is to move your operations to the cloud. We can help you do a deep dive on the modern workplace journey to the cloud, with our website resources. Read all about it!

Download the Two Factor Authentication eBook Today!
Does Creating a Cybersecurity Plan Make Your Head Spin?



VOIP Advantages, and Why You Should Run Your Company’s Phones on the Internet

VoIP is a technology for phones that allows you to make and receive calls over your internet connection rather than through a copper wire buried in the ground. Switching to VoIP from standardized phone services has many advantages, from cost to flexibility.
Read Post
Password rules Blog

9 Rules For Strong Password Creation

Teach your employees the basic principles of password management, and you can slam the door on cyber thieves. These 9 simple rules from Iconic IT will help your employees make password hygiene second nature for your employees.
Read Post
No Internet Connection Blog

Are You Connected to WiFi, But Have No Internet Connection? Here’s What To Do.

Does your computer say you’re connected to wifi, but there is no internet connection? We feel your pain. Let Iconic IT walk you through the steps you need to take, and show you how to fix “no internet connection” problems at your house.
Read Post