Five Password Rules Every User Should Follow - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Change Your Password Anytime-5 Next

Change Your Password Anytime

When it comes to pre-empting possible breaches in security though, it's better for employees to come forward if they suspect their accounts are compromised or confidential data has been illegally accessed than to find out on the front page of the morning papers.

Our SMB Blogger Paul Mah is always reminding you how important proper training is for small and medium-sized businesses. This is especially true when it comes to proper security practices for staffers. Passwords are typically the first line of defense against unauthorized access, and Paul highlights some pointers about password management that all employees should know about. (To get a complete overview of these tip, be sure to check out Paul's blog post.)

Hopefully, knowing why certain policies are enacted will prompt employees to follow them. In this slideshow, Paul highlights five aspects of good password management that employees should know about.

More Slideshows:


11 Work-Related iPad Apps Worth a Look The sexy Apple tablet already has a growing fleet of business software on the market.

Ten Reasons to Upgrade to Windows 7 So what are some of the practical things to like about Windows 7?


Now Hiring: Top 10 In-Demand Tech Skills Two-thirds of those surveyed by Dice.com said they had at least one hard-to-fill position available.

 

Related Topics : Semantic Web

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.