Protecting Corporate Identities Through Password Management

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Protecting Corporate Identities Through Password Management-3 Next

Rotation

IT admins can also specify whether the most recent password can be re-used, the password rotation duration, and the number of failed attempts allowed. Employees should be changing their password every 30 to 90 days (depending upon the criticality of the IT resource), and they should not be allowed to repeat their last five passwords. Rotation has a secondary benefit: It makes it much harder for employees to use the same password across many IT resources, which is a critical issue to solve.

Corporate identities are the most valuable digital asset for hackers today. They are constantly being attacked and are perpetually at risk. Identities are the proverbial keys to the kingdom, and include private enterprise applications, devices, networks and data. If a hacker were to gain access to the right credentials, it could be devastating to an organization.

One of the best ways to keep corporate identities safe is to practice proper password management. From an IT perspective, this entails determining the types of passwords that are acceptable and where they are housed on the company's systems. It also focuses on having a unique password per service where possible.

In this slideshow, Rajat Bhargava, CEO and co-founder, JumpCloud, has identified the top five factors of sophisticated password management strategies used to protect corporate identities.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.