Password rules for creating strong passwords: 9 steps to GET STRONG

9 Password Rules For Stronger Password Creation

Employee passwords can often fall short of being secure in many ways. It’s not necessarily their fault, though; many organizations don’t have password rules to encourage employees to make strong passwords.

When you consider how many applications, files and devices your employees log into on a daily basis, it’s easy to understand why they would make passwords short and easy to remember.

Password rules for your organization don’t have to be complicated. Follow these 9 password creation steps and GET STRONG.

– GO WITH ENCRYPTION All passwords should be stored with encryption.
– ESCAPE COMPLEXITY Even though the password rules may be complicated, try to create them so they are easily remembered.
– TEACH EMPLOYEES Make sure all employees know and follow password rules and requirements.
– SIZE MATTERS Longer passwords are harder to hack, so all passwords should be a minimum of 8 characters. System passwords should be between 12 and 50 characters in length.
– TRUST NO ONE Add authentication processes to logins, such as Google Authenticator, Duo, RADIUS tokens, or other 2-factor options.
– ROTATE OFTEN Users should change their passwords every 90-180 days.
– OMIT DUPLICATES Never use the same password across multiple applications, systems and accounts.
– NO CHEATING  Disable password hints.
G – GET A VAULT Store passwords in secure vaults such as 1Password.

Password protections are the first steps in protecting your data, files and devices from unauthorized access.

Following these 9 simple GET STRONG rules should make it easy for your teams to create long, strong, easily remembered passwords.

Download the Two Factor Authentication eBook Today!


Ransomware Attack Cybersecurity Tips

Healthcare Ransomware: Protecting Your Patients and Your Network

Healthcare ransomware is not a new threat; healthcare industry organizations have been ransomware targets for decades. Did you know that the very first ransomware attack targeted the healthcare industry in 1989? Joseph Popp, a PHD, sent a very specific ransomware to AIDS researchers, distributing 20000 infected floppy discs (remember them?) across the globe.

Times have changed, though, and while leg warmers and cabbage patch dolls are no longer in fashion, ransomware certainly is.

Read Post
Come in, we're open Cybersecurity Tips

Reopening Your Business in East Texas? Here’s A List of Cybersecurity Safety Tips

Criminals are capable of hacking into your network with a wide variety of tools. There are sites on the dark web that sell ransomware; the bad actors simply buy it, install it, and launch it on the organization of their choice. Reopening your business in East Texas? Check out these cybersecurity safety tips to help you level the playing field.

Read Post
Cybersecurity Cybersecurity Tips

Protect Your Business from These 4 Mobile Security Threats

A Check Point Research report found that the number of cyberattacks targeting mobile devices in the first half of 2019 rose by 50% compared to the same period in 2018. To protect your company from such attacks, you need to know about these four mobile security threats

Read Post