Blogs and Posts
- By: David Moran
- Date: June 22, 2016
What is the most important layer of security between your network and the bad guys? Passwords of course. Passwords are what keep the appropriate people having valid access while keeping those who shouldn’t be on the network away from it.
Is your password policy right for your company? If not, you could be opening your business up to a security risk. There are some important things to keep in mind when setting, resetting and managing passwords.
Change that Password Every 90 Days
The 90-day rule has been around for a long time. Why 90 days? Typically because 90 days is a short enough time to prevent a compromised password that has gotten into the hands of a hacker from being used and doing any damage to your network.
It may seem excessive and many users complain about the 90 day policy but it is a necessary part of network security. Resist the urge to increase the amount of time due to user feedback.
While you can consider shortening the password change period, the math may not pan out. The amount of time and effort it takes to reset lost passwords, added to the lost productivity, tends to make it too costly to your company.
Use Complex Passwords
Names, children’s names, phone numbers, birthdays and common dictionary words are easy to remember. Which is why these choices are typically what users choose to set their passwords as. Unfortunately, they are also the easiest passwords to hack.
Passwords on your network should include at least two or three of the following, to ensure that they are complex:
- Mixed cases (both upper and lower)
- Numbers or numerals
- Special characters
- Length of 8 characters or over
- No names, dates or other common dictionary words
Having complex passwords makes it harder for hackers to use pattern generating software that can brute force hack accounts. It also makes it more difficult for them to social engineer a password by getting personal information about a person.
A more recent password technology is the use of multi-point authentication. This means along with a password, users must enter a separate code. Another method for multi-point authentication is the use of a card reader and a pin. Users enter a card into a card reader and then enter a programmed pin for access. Once the card is removed, access is also removed.
These technologies take a bit more expense and planning to implement. Though, they do make it well worth the investment when it comes to network security.
Most users get frustrated when they forget a password. Not only is their work delayed but it generates help desk tickets. That is why you might consider using password vault technology for your users.
This technology allows your users to store all of their passwords through encrypted plug-ins or use a master password that generates complex passwords on the back end.
Need Security IT Support in Stamford?
If you need IT support in Stamford for your business’ network, contact U.S. Computer Connection! Remember, uscomputer.com for all of your IT support concerns.
- July 2017 (3)
- June 2017 (6)
- May 2017 (4)
- April 2017 (6)
- March 2017 (4)
- February 2017 (5)
- January 2017 (5)
- December 2016 (5)
- November 2016 (5)
- October 2016 (4)
- September 2016 (6)
- August 2016 (4)
- July 2016 (7)
- June 2016 (7)
- May 2016 (6)
- April 2016 (5)
- March 2016 (7)
- February 2016 (5)
- January 2016 (5)
- December 2015 (6)
- November 2015 (1)
- October 2015 (2)
- August 2015 (5)
- Backup and Disaster Recovery (6)
- Business IT (24)
- Security (34)
- Training (21)
- Uncategorized (25)
- Webinar (17)