SHARE
Facebook X Pinterest WhatsApp

Are You One Password Away from a Data Breach?

With more activity happening in the cloud and employees more frequently working remotely or from a mobile device, IT pros are constantly challenged to keep data secure. The volume and frequency of data breaches is evidence enough of the risks facing today’s businesses. For instance, the Identity Theft Resource Center (ITRC) reports that the number […]

Written By
thumbnail
ITBE Staff
ITBE Staff
May 27, 2016

With more activity happening in the cloud and employees more frequently working remotely or from a mobile device, IT pros are constantly challenged to keep data secure. The volume and frequency of data breaches is evidence enough of the risks facing today’s businesses. For instance, the Identity Theft Resource Center (ITRC) reports that the number of U.S. data breaches tracked in 2015 was more than 750.

A data breach will certainly have an impact on a company’s reputation and credibility. But what are the tangible implications of a data breach? According to an IBM-sponsored study conducted by Ponemon Institute, the average cost paid for each lost or stolen record that contained sensitive and/or confidential information was $154. In a single attack, a hacker could gain access to hundreds of thousands of accounts, the cost of which can add up quickly.

Cybersecurity is a key issue for every business, and outside of large enterprises, most companies have a small IT team charged with managing security, in addition to their other responsibilities. To help improve overall cybersecurity practices, the first line of defense is often an educated user with strong password practices. In this slideshow, Joe Siegrist, VP and GM, LastPass, has identified ways IT pros can better manage access and improve user password security practices.

Are You One Password Away from a Data Breach? - slide 1

Improving Password Security Practices

Click through for ways IT pros can improve password security practices, as identified by Joe Siegrist, VP and GM, LastPass.

Are You One Password Away from a Data Breach? - slide 2

Manage Employee Passwords

In order to be effective, good password hygiene should not only be encouraged but enforced. IT pros should implement requirements around password strength to ensure employees are proactively creating robust passwords. For example, possible rules could include requiring a combination of numbers, letters and punctuation or not permitting consecutive numbers and letters. In addition, IT pros should establish policies that require a password to be changed at a given frequency (for instance, every 60 to 90 days).

Are You One Password Away from a Data Breach? - slide 3

Turn on Two-Factor Authentication

IT pros should consider implementing two-factor authentication, which requires an additional step before logging into an account, even if the correct password is used (typically through a text message or email that requires the user to verify that they are attempting to login to the given account). Using two-factor authentication provides an additional level of security to ensure the right people are accessing the appropriate accounts.

Are You One Password Away from a Data Breach? - slide 4

Prioritize Access Control

Companies may use hundreds of applications as part of their day-to-day operations, and it can be difficult to manage who has access to what information. It’s critical to keep track of the apps used across the organization and be sure to assign access privileges based on roles. Access control is also often overlooked when it comes to off-boarding employees. All off-boarding processes and plans should specifically outline password and access updates so terminated employees no longer can log in to key accounts. IT pros should also create a clearly defined process for improving and maintaining app security. This will ensure the appropriate levels of approval for granting access to accounts as well as increased transparency into who can access what.

Are You One Password Away from a Data Breach? - slide 5

Share Passwords Responsibly

A recent LastPass survey showed that 95 percent of respondents share more than one password with others. IT pros should manage shared passwords from a centralized location (using a password manager or secure file is ideal). All shared passwords should be updated regularly, especially when employees leave an organization, and when someone outside of the company (think vendor, client or customer) accesses a corporate account.

Are You One Password Away from a Data Breach? - slide 6

Leverage BYOD Policies

With more and more companies transitioning to a BYOD (Bring Your Own Device) environment, IT pros should create specific policies and guidelines when employees are using their own device. Some examples include staying off public Wi-Fi, using two-factor authentication, limiting the applications that can be used or accessed on the device, and establishing an employee exit policy for when employees leave the organization.

Are You One Password Away from a Data Breach? - slide 7

Streamline Password Management

IT pros should consider using a password manager to store employee and company passwords in one secure place. By automating password storage, employees are more able and willing to practice good password hygiene since the password manager tool does most of the work for them in terms of remembering and updating passwords.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.