Strategies for Better Management of All of Your Passwords

Introduction

Passwords are your first line of defense against a world of painful experiences ranging from data theft to ransomware. Unfortunately, most individuals and even IT professionals are guilty of committing several common “password sins” that make it far more likely for a breach to occur.

Consider the following statistics from the State of Password and Authentication Security Behaviors Report:

  • 81% of all hacking-related data breaches involved stolen or weak passwords.
  • 69% of IT professionals share their passwords with colleagues to access accounts.
  • 51% of IT professionals reuse passwords across businesses and personal accounts.
  • 57% of IT professionals who have experienced phishing attacks have not changed their password management behavior.
  • 67% of IT professionals do not use any form of two-factor authentication in their personal use, and 55% do not use it at work.
  • 57% of IT professionals expressed a preference for a login method that does not involve passwords.
In the article below, we’ll highlight strategies you can implement today that will help you build a more secure and resilient password policy.

What are password policies?

A password policy is an established set of rules that have been created to increase password security by encouraging strong, secure passwords that are properly stored and utilized. Password policies help protect your IT infrastructure from intrusion and your data from those who would like to steal it.

Principles of Effective and Secure Password Management

1. Create a long and strong passphrase.

 

To make it more difficult for hackers to crack into your system, consider generating strong passwords. A strong password is considered to be a password over eight characters in length and consisting of a mixture of uppercase and lowercase letters, numbers, and symbols.

2. Apply Password Encryption.

 

Encryption enables your passwords with additional protection that is uncrackable, even if your passwords are stolen by cybercriminals. The most recommended practice is to utilize non-reversible end-to-end encryption. This allows you to protect your passwords even while they are in transit over the network.

3. Implement two-factor authentication.

Two-factor authentication, also known as 2FA, has quickly become the standard in managing organizational resources for both business and personal use. Not only do users input traditional credentials such as their username and password to access their applications, but they also confirm their identity with a one-time code that is sent to their mobile device – usually via email or text message. A personalized USB token can also be used in two-factor authentication. This allows an extra step for hackers to gain access and is usually information inaccessible to them.

4. Add advanced authentication methods.


Apply non-password-based methods such as voice, facial recognition or thumbprint recognition. These methods make it increasing difficulty for hackers to gain access into your system.

5. Use different passwords for every account.


Using the same password across the board sets both you and your business up for an increased risk of security breaches. How does it work to the bad guys’ advantage? If one account is breached, other accounts with the same credentials are also highly susceptible to being compromised.

6. Avoid Recycling Passwords.


Periodically changing passwords, such as every 90 or 180 days, has been a widely enforced practice in password security. More recent advice from the US National Institute of Standards and Technology (NIST), however, strongly suggests not to use a mandatory policy of password changes for personal use. (Keep in mind that this advice does not apply to privileged credentials, however.) A primary reason for this suggestion is because most users tend to simply recycle previously used passwords. While strategies can be implemented to avoid password reuse, creative users will find ways around those strategies. Frequent password changes also cause users to write down their passwords in order to remember them, which is NOT a recommended practice. For these reasons, NIST recommends only changing passwords in the event of potential threat or compromise.

7. Use Password Managers.


Password managers store and even create passwords for your various accounts and automatically sign you in as you log on, making it so you only need to remember one password. As long as you choose a strong and unique, but easy-to-remember master password, you have achieved a near-perfect way of protecting your access credentials from unauthorized users.

Conclusion

Organizations should carefully and thoroughly examine their password security policies and password management as both stolen and weak passwords continue to be the most common reasons for breaches in data. With these best practices, you can create an efficient password security policy and provide your business with stronger protection against unauthorized users.

Want some help setting up your password policies or implementing an enterprise-level password management solution? The Secutor team is here to help. Give us a call or send an email to begin a no-obligation conversation.

Get in touch with us

Secutor Cybersecurity is a trusted partner comprised of industry leading experts in the fields of Cybersecurity and Governance, Risk and Compliance. We partner with our clients to deliver on-demand solutions tailored to expertly navigate the regulatory demands of their specific industries.

Our proven track record of successfully exceeding client expectations is achieved through the combination of our methodical approach, advanced technologies, subject matter experts, and synergy with client team members.

Secutor is your team of world-class problem solvers with vast expertise and experience delivering complete solutions keeping your organization protected, audit-ready, and running smoothly.

Scroll to Top

Introducing:
Secutor Insider Direct

Discover a new era in cybersecurity purchasing. No markups, no hidden fees. Just the right tools at the right price, tailored to your needs, with expert advice from our seasoned cybersecurity professionals.

Ready to Find Your Solution?

Use the form to schedule a consultation, and we’ll reach out within 48 hours to confirm the appointment.

Considering this delay, please only select meeting dates 48 hours or more in advance. Your information will only be used to facilitate a meeting.