Michael Jackson Michael Jackson

Password Best Practices

12 Password Best Practices

With the business world heavily reliant on digitalization in this day and age, the use of technology in your organization is unavoidable. Although technology can undeniably give your business an advantage in increasingly competitive markets, there are many troublesome areas to keep an eye on. This is why interest in cybersecurity has risen in recent years.

Password protection is the best place to start if you want to ramp up your cybersecurity. Setting a password to secure an entity’s data is called password protection. Only those with passwords can access information or accounts once data is password-protected. However, because of the frequent use of passwords, people tend to overlook their significance and make careless mistakes, which could lead to breaches in security.

This makes it imperative for businesses to devise strategies to educate employees about best practices when using passwords.

6 Password “Don'ts”

Protect the confidentiality of your passwords by following these six password “don’ts”:

1. Don’t write passwords on sticky notes

Although you may feel that writing down passwords improves password protection and makes it more difficult for someone to steal your passwords online, it can make it easier for someone to steal your passwords locally.

2. Don’t save passwords to your browser

This is because web browsers are terrible at protecting passwords and other sensitive information like your name and credit card number. Web browsers can easily be compromised and a wide range of malware, browser extensions and software can extract sensitive data from them.

3. Don’t iterate your password (for example, PowerWalker1 to PowerWalker2)

Although this is a common practice among digital users, it is unlikely to protect against sophisticated cyberthreats. Hackers have become far too intelligent and can crack iterated passwords in the blink of an eye.

4. Don’t use the same password across multiple accounts

If you do so, you are handing cybercriminals a golden opportunity to exploit all your accounts.

5. Don’t capitalize the first letter of your password to meet the “one capitalized letter” requirement

Out of habit, most of us tend to capitalize the first letter of our passwords to conform with the "one capitalized letter" requirement. However, hackers are aware of this, making it easy for them to guess the capitalized letter's position.

6. Don’t use “!” to conform with the symbol requirement

However, if you must use it, don’t place it at the end of your password. Placing it anywhere else in the sequence makes your password more secure.

6 Passwords “Do’s”

Protect the confidentiality of your passwords by following these six password “do’s”:

1. Create long, phrase-based passwords that exchange letters for numbers and symbols

For instance, if you choose "Honey, I shrunk the kids," write it as "h0ney1$hrunkth3k!d$." This makes your password harder for hackers to crack.

2. Change critical passwords every three months

Passwords protecting sensitive data must be handled with caution because there is a lot at stake if they are compromised. If you use a password for a long time, hackers may have enough time to crack it. Therefore, make sure you change your critical passwords every three months.

3. Change less critical passwords every six months

This necessitates determining which password is crucial and which is not. In any case, regardless of their criticality, changing your passwords every few months is a good practice.

4. Use multifactor authentication

It’s your responsibility to do everything in your power to keep nefarious cybercriminals at bay. One of the best approaches is to barricade them with multiple layers of authentication.

5. Always use passwords that are longer than eight characters and include numbers, letters and symbols

The more complicated things are for hackers, the better.

6. Use a password manager

A password manager can relieve the burden of remembering a long list of passwords, freeing up time for more productive tasks.

Need a password manager? We can help.

Adhering to password best practices requires constant vigilance and effort on your part. As a result, it is best to work with an expert managed service provider (MSP) like us who can help you boost your security and put your mind at ease. Contact us for a no-obligation consultation.

Read More
Michael Jackson Michael Jackson

Trust - June 2022 - PS PRO

The Case for Trust-Building as a Small Business (It’s Not Just for Enterprises)

There is a strong connection between trust and prosperity. In fact, when trust levels are high, businesses tend to grow faster. According to McKinsey and Company, Harvard Business Review, Forrester Research and many other reputable organizations, trust is the connecting fabric upon which innovation and business success are built.

You might think that trust-building isn't crucial for small to medium-sized businesses (SMBs), but it is critical if you want to achieve your business objectives and keep your employees and customers satisfied. While you might not expect a technology company like ours to discuss trust, we care about your business objectives and believe it is essential for your people, processes and technology.

Building trust is essential for any organization, whether it's a startup or a Fortune 500 company. It gives employees the confidence to take chances and innovate, gives customers the confidence to buy from and collaborate with you, and gives partners the confidence to do business with you. But how do you create a foundation for trust?

Leverage processes and technology

Building trust is not easy, and it often takes time and effort to develop. Luckily, there are a few things companies can do to succeed.

Integrate technologies

Technology integration is one of the most important considerations for businesses today. Not only do neatly integrated technologies save time and serve as a reliable foundation, they can also reduce friction within your company. Inefficient or incompatible technologies can create chaos and confusion, slowing down workflows and damaging productivity.

If you take the time to select and integrate the right technologies, it can make all the difference in terms of organizational efficiency and success.

Deploy thoughtful processes

Thoughtful processes that consider the user experience can reduce confusion and opportunities for conflict and make it easier for employees to work for you. Friction arises when an individual’s expectations do not match the actual experience. When this occurs, it can lead to conflict as people attempt to shift responsibility or blame.

Thoughtful processes can help ensure that everyone’s expectations are met, minimizing the chances of a conflict.

Secure data

When it comes to organizational data breaches, customers and employees are quick to lose trust in companies that can’t protect their sensitive data. Implementing measures to secure your customer and employee data is one way to help rebuild trust. In doing so, you are not only protecting your customers and employees, but also your bottom line.

Volkswagen Group of America recently confirmed a data breach that occurred in 2021.* The data breach, which affected approximately three million customers, resulted in the theft of customer names, email addresses and vehicle identification numbers. The company had to spend a lot of money on recovery, but how many SMBs can afford that?

What's more concerning is that the Volkswagen data breach is just the latest in a long series of cybersecurity incidents, with more likely to follow in the coming years.

Choose the right partner

Since trust-building can be so challenging for SMBs to handle alone, collaborating with a managed service provider (MSP) like us is the best option. MSPs can help with tasks such as disaster recovery, compliance, security and much more. Working with an MSP such as us will allow you to concentrate on your core competencies, safe in the knowledge that your customers' data is secure.

Feel free to reach out for a no-obligation consultation.

Read More