Protecting Corporate Identities Through Password Management

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Protecting Corporate Identities Through Password Management-2 Next


Choosing an appropriate and secure password is vital when ensuring the protection of a corporate identity. Long gone are the days when P-A-S-S-W-O-R-D was an acceptable password, and IT admins need to get strict on the types of passwords that will make the cut. IT needs the capability to define minimum attributes for passwords, including length (arguably the most important feature of a secure password), and character type to control each password's strength. While employees may get annoyed by long, overly complicated passwords that entail lower and uppercase letters, numbers and symbols, this is the first line of defense to stop hackers from accessing corporate identities.

To assist in this effort, many tools on the market support generating complex passwords. Keepass is a password manager with a five-star rating on SourceForge. This tool is open source so its integrity can be scrutinized by anyone. Keepass can be run out of your browser, is easy to use, and doesn't automatically put your database in the cloud, which makes it even more secure. LastPass enables employees to utilize and manage highly complex passwords across both work and personal accounts without having to memorize or store them somewhere insecure like a Word document or spreadsheet. It also has a feature that points out vulnerabilities in passwords and fixes them.

Corporate identities are the most valuable digital asset for hackers today. They are constantly being attacked and are perpetually at risk. Identities are the proverbial keys to the kingdom, and include private enterprise applications, devices, networks and data. If a hacker were to gain access to the right credentials, it could be devastating to an organization.

One of the best ways to keep corporate identities safe is to practice proper password management. From an IT perspective, this entails determining the types of passwords that are acceptable and where they are housed on the company's systems. It also focuses on having a unique password per service where possible.

In this slideshow, Rajat Bhargava, CEO and co-founder, JumpCloud, has identified the top five factors of sophisticated password management strategies used to protect corporate identities.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.