You know that your password should never be “1234” or “password,” but do you know the features of good password management? Changing best practices in password management are just one of the emerging trends in data security. Take a look at some of the ways businesses left themselves vulnerable in 2019:
Supply Chain Attacks: Even companies that have strong security policies can be vulnerable if business partners are not following a similarly robust set of protocols. Supply chain attacks occur when malicious individuals gain access to your enterprise through a provider, customer, or third-party service supplier. It’s important that, when you consider as a service providers, you examine their security practices.
Questions of Responsibility: As enterprises migrate to the cloud, they often make the mistake of assuming they are shaking free of security concerns. They have been told that the cloud is more secure than anything they could implement on site, but enterprises need to remember that data and systems security is ultimately their responsibility. They bear the exposure to the risk, so they must take responsibility for security.
“Too Small” Mentality: Many small business owners and “solopreneur” companies assume that no hacker would ever bother with their small set of data. The opposite is often true because hackers know that smaller businesses often have fewer protections on their data, and all data is valuable. In addition, those hackers pursuing a supply chain breach may seek access through a small business to get entrance to their suppliers and other business partners.
Poor Password Management: One of the easiest areas for enterprises to address is, unfortunately, one of the areas that is most often left exposed. Many IT teams underestimate the importance of solid password management. While in the past, recommendations included changing passwords often and using combinations of letters, numbers, and other characters, the guidelines for a good password are changing.
Now experts are recommending that end users simply think “long and memorable” and use different passwords for different applications. Users might utilize a favorite movie or book quote, for instance, but use a different one for each login. Another good idea is to use a family saying that you’d never forget but nobody outside your family would recognize.
The length of the password is also important. While it only takes about nine seconds to crack a six-character password, it can take up to 9,000 days for a 10-character password.
For enterprises that want to prioritize password management, but may not have the resources to do so in-house, there is the option of outsourcing oversight to a third-party provider. Many find that this option allows them to implement best practice for password management without taking focus away from their core business processes.If you are weighing options for how to best prioritize good password management, contact us at Cory Communications. We can help you determine whether you can achieve your security policies in-house or if you need to leverage the benefits of a targeted solution.