Providing IT Services in NY, CO, KS, FL, and TX

Portal Login Support Pay My Bill

9 Password Rules For Stronger Password Creation

Employee passwords can often fall short of being secure in many ways. It’s not necessarily their fault, though; many organizations don’t have password rules to encourage employees to make strong passwords.

When you consider how many applications, files and devices your employees log into on a daily basis, it’s easy to understand why they would make passwords short and easy to remember.

Password rules for your organization don’t have to be complicated. Follow these 9 password creation steps and GET STRONG.

– GO WITH ENCRYPTION All passwords should be stored with encryption.
– ESCAPE COMPLEXITY Even though the password rules may be complicated, try to create them so they are easily remembered.
– TEACH EMPLOYEES Make sure all employees know and follow password rules and requirements.
– SIZE MATTERS Longer passwords are harder to hack, so all passwords should be a minimum of 8 characters. System passwords should be between 12 and 50 characters in length.
– TRUST NO ONE Add authentication processes to logins, such as Google Authenticator, Duo, RADIUS tokens, or other 2-factor options.
– ROTATE OFTEN Users should change their passwords every 90-180 days.
– OMIT DUPLICATES Never use the same password across multiple applications, systems and accounts.
– NO CHEATING  Disable password hints.
G – GET A VAULT Store passwords in secure vaults such as 1Password.

Password protections are the first steps in protecting your data, files and devices from unauthorized access.

Following these 9 simple GET STRONG rules should make it easy for your teams to create long, strong, easily remembered passwords.

Download the Two Factor Authentication eBook Today!
Does Creating a Cybersecurity Plan Make Your Head Spin?

RECENT BLOG POST

hacker at work Cybersecurity Tips

VPN Safety in the Face of Targeted Iranian Cyberattacks

On September 15, 2020, the CISA issued a dire warning: Iranian state sponsored actors are targeting VPNs during a time when businesses are relying on them the most. Many businesses are currently using VPNs to ensure network safety for their remote teams.

Read Post
sleepy dog keyboard Blog

Nine Back-to-School Safety Tips for Online Learning

Logins that don’t work, late to sign in for classes, uncharged devices, lost or deleted files; school sure looks different this year for our students as they face the challenges of online learning. You make sure they wake up on time and that they are logged in, but what about online back-to-school cybersecurity? Hackers have been waiting for this moment their entire lives; a nation full of unsuspecting children using unprotected devices for schoolwork.

Read Post
Ransomware Attack Cybersecurity Tips

Healthcare Ransomware: Protecting Your Patients and Your Network

Healthcare ransomware is not a new threat; healthcare industry organizations have been ransomware targets for decades.
Times have changed, though, and while leg warmers and cabbage patch dolls are no longer in fashion, ransomware certainly is.

Read Post