<span style=”font-weight: 400;”>Remote working has impacted the world of cybersecurity in multiple ways. Remote workers are often not protected by enterprise-level security and so are more prone to cyberattack. The FBI reported a 300% increase in cybercrimes since the pandemic began, and remote work has increased the average cost of a data breach substantially. </span>
<span style=”font-weight: 400;”>Employees working from home are also distracted – </span>
<span style=”font-weight: 400;”>“47% of remote workers cited distraction as the reason for falling for a cyberattack.”</span>
<span style=”font-weight: 400;”>In other words, </span><span style=”font-weight: 400;”>if you do not have a plan in place to mitigate these risks</span><span style=”font-weight: 400;”>, you are setting yourself up for a potentially devastating cybersecurity breach.</span>
<span style=”font-weight: 400;”>One simple way to protect your organization from breaches is to apply a strong password policy at all levels of the organization, and enforce it by implementing a secure password policy management solution (PPM).</span>
<span style=”font-weight: 400;”>Here are some password policy best practices you may find useful.</span>
<h3><span style=”font-weight: 400;”>1. Increase password length and strength</span></h3>
<span style=”font-weight: 400;”>Brute force attacks try all possible combinations of characters to arrive at the password. A 6 string password with only upper or lower case letters can be cracked in 8 seconds. An 18 character password with upper and lower case letters, numbers and symbols can take 1 quintillion years to crack! By adding a special character, combining both upper and lower case letters or adding numbers, encryption can be much more secure.</span>
<img class=”aligncenter size-full wp-image-1010″ src=”https://www.akku.work/blog/wp-content/uploads/2021/07/image16.png” alt=”” width=”1195″ height=”635″ />
<i><span style=”font-weight: 400;”>Image Credit: </span></i><a href=”https://www.ghacks.net/2012/04/07/how-secure-is-your-password/”><i><span style=”font-weight: 400;”>ghacks.net</span></i></a>
<span style=”font-weight: 400;”>The full strength of the Advanced Encryption Standard (AES) comes to bear when users create passwords of 32 characters for 128-bit encryption and 64 characters for 256-bit encryption. However, passwords of around 10 characters are strong enough for most applications.</span>
<h3><span style=”font-weight: 400;”>2. Simplify as much as possible</span></h3>
<span style=”font-weight: 400;”>A password made of only numbers has 10 options for each character in the string, one made of numbers and letters has 36 options, and if you include special characters that adds another 32 possible characters for each spot in the string. </span><span style=”font-weight: 400;”>This makes it more challenging for brute force attacks to be successful.</span><span style=”font-weight: 400;”> Complexity in terms of the kind of characters that can be used in the password is, therefore, an advantage.</span>
<span style=”font-weight: 400;”>However, do not mandate the usage of these different kinds of characters. This can lead to frustration and reuse of the same password with minor character substitutions (P@ssword or Passw0rd, for example). This is especially the case when the policy also demands frequent changes of password. If the old password is compromised, such minor variations will be relatively easy to guess, too.</span>
<span style=”font-weight: 400;”>To mitigate this risk, don’t mandate the use of special characters and reduce the frequency of mandatory password reset to approximately once a year. A long password using only lowercase letters is more secure than a short one which is a variant of an older password.</span>
<h3><span style=”font-weight: 400;”>3. Do not allow password reuse</span></h3>
<span style=”font-weight: 400;”>Do not allow reuse of earlier passwords during periodic password reset to increase security. Train your staff not to use minor variations of their earlier passwords, and instead look for completely different passwords.</span>
<span style=”font-weight: 400;”>Also train staff on the risks of reusing passwords across home and work accounts. Password reuse results in a huge surge in credential stuffing attacks. If any service is compromised and your password and username are stolen, hackers could use the same credentials to try and hack your other accounts. Each account must therefore use unique credentials to maintain security.</span>
<h3><span style=”font-weight: 400;”>4. Reinforce passwords using multi-factor authentication (MFA)</span></h3>
<span style=”font-weight: 400;”>Multi-factor authentication uses a combination of things you know, such as a password or PIN; things you have, such as a badge or smartphone; and things you are, such as biometric data, to authenticate your right to access a particular system, data or application.</span>
<span style=”font-weight: 400;”>Enabling MFA ensures that even if a password is stolen, the system is not compromised.</span>
<h3><span style=”font-weight: 400;”>5. Use a secure password manager</span></h3>
<span style=”font-weight: 400;”>Many users find it difficult to remember their passwords for multiple online services, and so either use a single password for all, or, worse, save all their passwords to an unreliable password manager. </span>
<span style=”font-weight: 400;”>If you do opt for a password manager, choose one that is highly secure, in order to mitigate the risk involved. Most IAM solutions will include a password manager or, with Single Sign-on, completely do away with the need for multiple passwords. A single secure password is enough to log on to your IAM and access your applications and data.</span>
<h3><span style=”font-weight: 400;”>6. Use an IAM application for Password Policy Management (PPM)</span></h3>
<span style=”font-weight: 400;”>It’s one thing to lay down rules for password policy across the organization. It’s quite another to enforce the policy. An Identity Access Management (IAM) application can help you ensure that all your users consistently comply with a high standard of security while setting their passwords, without the need for a separate password policy enforcement tool.</span>
<span style=”font-weight: 400;”>Administrators can customize and define password policy for all users in the organization. You can also specify upon whom the policy should be enforced, based on the users’ access level. Password policies can of course also be defined as blanket rules.</span>
<span style=”font-weight: 400;”>A common perception is that the risks associated with breached passwords do not apply to your organization as you have secure systems. But your organization’s data security is only as strong as the weakest password of your users. In 2020, 770 million credential stuffing attacks occurred. That means that if your employee’s personal passwords are compromised, and they have reused the same password at work, your data is compromised too. Worse, 17% of all sensitive files are accessible to all employees, and about 60% of companies have over 500 accounts with non-expiring passwords.</span>
<i><span style=”font-weight: 400;”>Implementing a robust Identity and Access Management (IAM) solution brings you several steps closer to protecting your user credentials and corporate data. Worldwide, cybercrime costs will hit $6 trillion annually this year. Don’t let your organization succumb to a Data breach! With these simple steps, you can stay safe with multiple layers of data protection. Allow our team at Akku to help you secure your systems.</span></i>
Businesses in any industry face security and compliance issues. However, security requirements and priorities are not the same across the…
While the share of employees working remotely worldwide has increased significantly in recent years, to 28% in 2023, IT has…
Small, mid-sized, and large enterprises face different challenges with access management. From limited resources to scaling complexities to sprawling organizational…
With more cyber threats emerging on a daily basis, the world of cybersecurity needs to evolve fast to suit. As…
Even as an increasing percentage of the workforce works remotely, cyberattacks on organizations continue to surge. 73% of executives viewing…
In case you’re still wondering how important it is to focus on security during remote operations and collaboration, there are…