Easy passwords might allow you to access your accounts quickly, but they can do the same for hackers. The more characters you use, the better.
Do you know all the usernames and passwords for your router, firewall, computers and other technology on your network? All business owners and CEOs should have access to this information.
If you switch IT service providers or a piece of hardware shuts down, you need to know them to keep your business running. But how are you supposed to keep track of all these usernames and passwords? Who else should have access to them? How often do you need to change passwords? We’ll answer all these questions and more, so read on.
Easy passwords might allow you to access your accounts quickly, but they can do the same for hackers. The more characters you use, the better. One trick you can use if you can’t remember completely randomized passwords is to create a passphrase instead of a password. Use spaces to make a sentence and incorporate numbers and special characters in place of letters. For example w1Nt3r iZ com;nG? instead of “winter is coming.”
Here are some tips when it comes to creating strong passwords:
1. Use at least 8 characters that include:
2. Use a unique password for each website or cloud application.
3. Change passwords every 90 days.
4. Never share passwords.
5. Use a password manager.
You can consider using a password manager to keep track of your passwords and usernames. A password manager generates, keeps track of, and retrieves complex and long passwords for you to protect your vital usernames and passwords. Plus, it provides answers to security questions for you to authenticate your identity. All of this is done with strong encryption that makes it difficult for hackers to decipher.
Password managers automatically store your login credentials for the various sites you visit. Passwords are encrypted in a database using a master password, so all that you need to remember is your master password.
When creating a new account, the first thing to do is to choose a master password. This controls access to your password management database. Make sure it’s a strong password that you can remember because it’s the only one you’ll be using. You can change it later if you need to.
Your master password can be connected to the active directory, which means you can use this one password to log in to computers, send emails and wherever you need to use a password. And when your passwords need updating, you only have to change the master password.
To use the password management software you simply input your master password for the password management software. The program automatically fills in the appropriate login data for you. You can also configure it to store your email address, username and other data.
A variety of password managers are available, but you want to choose one that’s designed for business use. There are many solid options. We use My Glue from IT Glue but there are others you can choose from:
There are many more Password Managers to choose from. And there are also password management tools where you provide a one-time link so an authorized person can use the password for specific purposes. Once they use the password, it expires.
Good passwords aren’t easy to guess, but they also don’t last forever. There are times when changing passwords is critical, such as when:
Keep a reminder on your calendar to change out passwords regularly.
Your IT company should have access. They should keep an inventory of all the passwords for your hardware and appliances on your IT system. And they should provide you with an up-to-date list. Don’t let them walk away with passwords to your router, firewall and more. If you decide to switch IT providers, you might not be able to get them back.
If you switch IT companies, they should present you with a complete checklist of all your passwords. If for some reason you can’t retrieve them from your old company, your new one tech service will have to reset them or try to crack your passwords to reveal what they are.
It’s also vital to know who has access to your passwords and usernames. It shouldn’t be anyone other than you and your IT company.
If you liked this article, we have many more on The NOVA Blog.
Contents