Contact Sales: |   Support: | Pay My BillClient SupportLet’s Talk!

9 Rules For Strong Password Creation

Do your employees know how to create a strong password?

Employee passwords can often fall short of being secure in many ways. It’s not necessarily their fault, though; many organizations don’t have password rules to encourage employees to make strong passwords.

When you consider how many applications, files and devices your employees log into on a daily basis, it’s easy to understand why they would make passwords short and easy to remember.

Password rules for your organization don’t have to be complicated. Follow these 9 password creation steps and GET STRONG.

– GO WITH ENCRYPTION All passwords should be stored with encryption.
– ESCAPE COMPLEXITY Even though the password rules may be complicated, try to create them so they are easily remembered.
– TEACH EMPLOYEES Make sure all employees know and follow password rules and requirements.
– SIZE MATTERS Longer passwords are harder to hack, so all passwords should be a minimum of 8 characters. System passwords should be between 12 and 50 characters in length.
– TRUST NO ONE Add authentication processes to logins, such as Google Authenticator, Duo, RADIUS tokens, or other 2-factor options.
– ROTATE OFTEN Users should change their passwords every 90-180 days.
– OMIT DUPLICATES Never use the same password across multiple applications, systems and accounts.
– NO CHEATING  Disable password hints.
G – GET A VAULT Store passwords in secure vaults such as 1Password.

Password protections are the first steps in protecting your data, files and devices from unauthorized access.

Following these 9 simple GET STRONG rules should make it easy for your teams to create long, strong, easily remembered passwords. For more password security tips, download the Two Factor Authentication ebook.

Download the Two Factor Authentication eBook Today!
Does Creating a Cybersecurity Plan Make Your Head Spin?


Cybersecurity Cybersecurity

Telehealth and Cybersecurity: Is Your Practice Protected?

You may not think of telehealth and cybersecurity as being linked, but the very technology you and your patients are relying on to stay connected and healthy is also one of the biggest risks you have for your practice.
Read Post
cybersecurity for remote workers Cybersecurity

Cybersecurity Tips for Remote Workers

As a business leader, you were pushed into some difficult decisions in 2020. Sending workers home to work remotely seemed a little like baking a cake without baking soda. While the idea was a good one, your approach may have been just a little flat. Cybersecurity for remote workers is a top concern for small to medium-sized businesses, per a recent study.
Read Post
Cybersecurity Cybersecurity

Cybersecurity Tips to For Patient Privacy & Healthcare Data Security

The shift to remote work has driven patients and practitioners out of the office and directly into the sights of bad actors. From healthcare targeted ransomware to third party vendor and supply chain breaches, let’s look at the biggest threats to your healthcare data security, and ways you can prevent them.
Read Post