Home  /  Resources  /  Blog  /  IT Solutions  /  What makes a password secure? A closer look at business security
Human finger print as evidence of identity and as a password

What makes a password secure? A closer look at business security

Security is an obvious necessity for businesses today, and one that has grown as technology has advanced and virtual intruders have found new and different ways to threaten our companies. There are many different aspects that go into modern business security, from backups and encryption to firewall and data recovery, but one of the most often overlooked is also one of the most basic: passwords.

Seemingly everything has a password protecting it these days, in far too many cases serving as the first and last line of defense between intruders and your sensitive data. Here are some key points to consider as it pertains to password protection within your place of business.

When should I use a password?

We mentioned how it seems like everything has a password protecting it these days, and there’s a good reason for that. With such a significant reliance on phones, laptops, and other devices in our everyday lives, we literally have much of our most personal data on us at all times, likely accessible if one or two passwords were to be discovered.

But do you really need a password on everything?

Generally speaking, if the password is being used to protect sensitive or confidential information or part of a path toward that information, then there’s good reason to have it. Some information will require more intense security measures than others, but any password is always better than no password.

What makes a good password?

This answer has changed over time. It used to be enough to simply use your pet’s name and your birthday as a password, but as intruders have become more sophisticated, passwords have had to do the same.

Password best-practice guidelines state:

  • Use at least 12 characters
  • Include numbers, symbols, and a mix of capital and lowercase letters
  • Avoid using any real words
  • Don’t use obvious substitutes (e.g. $ instead of S)

Password management

There are several password management tools you can leverage to auto-generate secure passwords and then store them all in one place for easy and secure storage (just make sure you remember the password to your password manager profile). This keeps you from reusing the same password across all or many of your accounts – something many of us have been guilty of to some degree.

Don’t be afraid to use a different complex password for everything. This will be the most secure method, and you can always reset if you forget. It’s better to forget and reset than to allow an unwanted entity to access your information.

Use two-factor authentication

Two-factor authentication provides an added layer of security when accessing an account, and should be utilized in more sensitive cases. You can set it up to have a code texted, called, or emailed to you, incorporate a security question, and more to ensure you and only you can gain access to this information.

Recap

  • Password-protect anything you don’t want anyone else to have immediate access to
  • Use long, complex passwords
  • Never use the same password twice
  • Use a password management tool to safely store your passwords
  • Use two-factor authentication for an added layer of security

Protect your business’s data with Corporate Technologies

Corporate Technologies delivers all-encompassing support to ensure every aspect of your business’s IT needs is effectively managed. Corporate Technologies provides:

  • Advanced security solutions for you and your clients
  • Cloud solutions to help you take your business digital while boosting accessibility and reducing your hardware footprint
  • Backups and protection to prepare against the unexpected
  • Personalized onsite support to achieve face-to-face resolutions for any IT issue

Contact us today to take total control of your business’s IT needs and to learn more about the added benefits of our Technology Advantage program.

Read more blog posts