{"id":5609,"date":"2020-03-17T16:20:09","date_gmt":"2020-03-17T16:20:09","guid":{"rendered":"https:\/\/cybersmart.com\/?p=5609"},"modified":"2021-10-01T10:23:06","modified_gmt":"2021-10-01T10:23:06","slug":"remote-working-best-practices-what-makes-a-strong-password","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/remote-working-best-practices-what-makes-a-strong-password\/","title":{"rendered":"Remote working best practices: what makes a strong password?"},"content":{"rendered":"

Still using the password you conjured up for your first email account in 2002 featuring your favourite footballer? We hope not. Passwords play an absolutely essential role in the security of your company and weak passwords are some of the easiest way for hackers to breach your cyber defences through employee accounts.<\/p>\n

In this article we’ll be sharing advice on how to avoid this common, but easily avoided, security pitfall.<\/p>\n

Minimum password length for systems<\/b><\/h2>\n

For all password-protected systems, your business should try to follow these basic steps when configuring them:<\/span><\/p>\n