Password Best Practices – RMON Networks

With our businesses today being heavily reliant on technology and the concerns in and around cyber security, the usage of creating and using passwords is unavoidable.  If you want to ramp up your IT security measures, password protection is the place to start.  However, the problem for most people is that they get frustrated when having to reset your password for a new app or service? They sometimes put in the minimum effort and use something quick but easily guessable.  Most of us have fallen into this trap, but it’s never too late to start practicing better online security measures. Staying safe online begins with setting secure passwords, and while there are many best practices out there– here are 10 especially useful tactics that any professional can apply!

Let’s take a look some tips on how you and your team can help keep your personal information away from prying eyes and ultimately increase the security of your company’s data.

Protect the confidentiality of your passwords by following these five password “don’t do”:

5 “Don’t Do’s” when creating Passwords:

1. Don’t write passwords on sticky notes.

Although you may feel that writing down passwords improves password protection and makes it more difficult for someone to steal your passwords online, it can make it easier for someone to steal your passwords locally.

2. Don’t save passwords to your browser.

Web browsers are terrible at protecting passwords and other sensitive information like your name and credit card number. Browsers can easily be compromised and a wide range of malware, browser extensions and software can extract sensitive data from them.

3. Don’t iterate your password (for example, PowerWalker1 to PowerWalker2).

Although this is a common practice among digital users, it is unlikely to protect against sophisticated cyberthreats. Hackers have become far too intelligent and can crack iterated passwords in the blink of an eye.

4. Don’t capitalize the first letter of your password to meet the “one capitalized letter” requirement.

Out of habit, most of us tend to capitalize the first letter of our passwords to conform with the “one capitalized letter” requirement. However, hackers are aware of this, making it easy for them to guess the capitalized letter’s position.

5. Don’t use “!” to conform with the symbol requirement.

However, if you must use it, don’t place it at the end of your password. Placing it anywhere else in the sequence makes your password more secure.

 

5 Passwords “Do’s”

Protect the confidentiality of your passwords by following these five password “do’s”:

1. Create long, phrase-based passwords that exchange letters for numbers and symbols.

For instance, if you choose “Honey, I shrunk the kids,” write it as “h0ney1$hrunkth3k!d$.” This makes your password harder for hackers to crack.

2. Use multifactor authentication.

It’s your responsibility to do everything in your power to keep nefarious cybercriminals at bay. One of the best approaches is to barricade them with multiple layers of authentication.

3. Always use passwords that are longer than eight characters and include numbers, letters and symbols.

The more complicated things are for hackers, the better.

4. Avoid using personal information.

When creating a password, it is important to avoid using any personal information such as your name, address, birthdate or phone number. This makes it easy for hackers to guess and compromise your account.

5. Use a password manager.

A password manager can relieve the burden of remembering a long list of passwords, freeing up time for more productive tasks.

Need help in selecting a professional password manager? We can help.

Adhering to password best practices requires constant vigilance and effort on your part. As a result, it is best to work with an expert managed service provider (MSP) like us who can help you boost your security and put your mind at ease. Contact us for a consultation today 800-706-7666!

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *