Five Password Rules Every User Should Follow - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Change Your Password Anytime-5 Next

Change Your Password Anytime

When it comes to pre-empting possible breaches in security though, it's better for employees to come forward if they suspect their accounts are compromised or confidential data has been illegally accessed than to find out on the front page of the morning papers.

Our SMB Blogger Paul Mah is always reminding you how important proper training is for small and medium-sized businesses. This is especially true when it comes to proper security practices for staffers. Passwords are typically the first line of defense against unauthorized access, and Paul highlights some pointers about password management that all employees should know about. (To get a complete overview of these tip, be sure to check out Paul's blog post.)

Hopefully, knowing why certain policies are enacted will prompt employees to follow them. In this slideshow, Paul highlights five aspects of good password management that employees should know about.

More Slideshows:


11 Work-Related iPad Apps Worth a Look The sexy Apple tablet already has a growing fleet of business software on the market.

Ten Reasons to Upgrade to Windows 7 So what are some of the practical things to like about Windows 7?


Now Hiring: Top 10 In-Demand Tech Skills Two-thirds of those surveyed by Dice.com said they had at least one hard-to-fill position available.

 

Related Topics : Semantic Web

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.