{"id":5609,"date":"2020-03-17T16:20:09","date_gmt":"2020-03-17T16:20:09","guid":{"rendered":"https:\/\/cybersmart.com\/?p=5609"},"modified":"2021-10-01T10:23:06","modified_gmt":"2021-10-01T10:23:06","slug":"remote-working-best-practices-what-makes-a-strong-password","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/remote-working-best-practices-what-makes-a-strong-password\/","title":{"rendered":"Remote working best practices: what makes a strong password?"},"content":{"rendered":"
Still using the password you conjured up for your first email account in 2002 featuring your favourite footballer? We hope not. Passwords play an absolutely essential role in the security of your company and weak passwords are some of the easiest way for hackers to breach your cyber defences through employee accounts.<\/p>\n
In this article we’ll be sharing advice on how to avoid this common, but easily avoided, security pitfall.<\/p>\n
For all password-protected systems, your business should try to follow these basic steps when configuring them:<\/span><\/p>\n The requirements mentioned above are simple to understand but can be difficult to implement. It is important to note that these rules need to be established across all password-protected devices and software.<\/span><\/p>\n To meet this requirement, you need to consult with your IT manager to ensure that all devices and software (whether third-party or proprietary) enforce the minimum password length.<\/span><\/p>\n A password policy is used to establish the rules and requirements for setting passwords. Creating a secure password policy for staff helps businesses protect themselves and allows them to meet the password requirements under the government’s Cyber Essentials certification scheme<\/a>.<\/span><\/p>\n The goal of a password policy is to take away the burden of individual users to create solid passwords. However, users should still be made aware of the password policy so that they pick sensible passwords for their email, devices, and other accounts.<\/span><\/p>\n Other than the minimum password length requirement mentioned above, your employees should:<\/span><\/p>\n If you want to see how long it would take a computer to guess your current passwords, check out HowSecureIsMyPassword<\/a>.<\/p>\n Ensuring the use of<\/span> strong passwords<\/span><\/a> is a key step towards becoming digitally secure.\u00a0<\/span><\/p>\n CyberSmart<\/span><\/a> helps businesses<\/span> comply with Cyber Essentials<\/span> by simplifying the process of compliance for them including complying with password regulations. If you would like to learn more about how to implement a password policy for achieving Cyber Essentials,<\/span> get in touch<\/span><\/a> with us.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" Still using the password you conjured up for your first email account in 2002 featuring your favourite footballer? We hope not. Passwords play an absolutely essential role in the security…<\/p>\n","protected":false},"author":4,"featured_media":5610,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,88,11],"tags":[92,90,9,129,48,126],"yoast_head":"\n\n
Enforce a secure password policy<\/b><\/h2>\n
\n
\n
Conclusion<\/b><\/h2>\n