SHARE
Facebook X Pinterest WhatsApp

Five Password Rules Every User Should Follow

Our SMB Blogger Paul Mah is always reminding you how important proper training is for small and medium-sized businesses. This is especially true when it comes to proper security practices for staffers. Passwords are typically the first line of defense against unauthorized access, and Paul highlights some pointers about password management that all employees should […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Mar 15, 2010

Our SMB Blogger Paul Mah is always reminding you how important proper training is for small and medium-sized businesses. This is especially true when it comes to proper security practices for staffers. Passwords are typically the first line of defense against unauthorized access, and Paul highlights some pointers about password management that all employees should know about. (To get a complete overview of these tip, be sure to check out Paul’s blog post.)

Hopefully, knowing why certain policies are enacted will prompt employees to follow them. In this slideshow, Paul highlights five aspects of good password management that employees should know about.

Five Password Rules Every User Should Follow - slide 1

Click through for five great tips that every user should know about the first line of network defense.

Five Password Rules Every User Should Follow - slide 2

Employees need to know that a short password can be very quickly compromised.This can be done by calculating the permutations based on the length of the password, as well as whether numerals and symbols are used.

Five Password Rules Every User Should Follow - slide 3

It is generally a very bad idea to use the same password for different accounts.However, it would be naive for an administrator to think that the typical employee would use a different password for every system that requires one.

Five Password Rules Every User Should Follow - slide 4

This sounds almost cliche now, but the IT department should periodically remind employees that its staff will never ask for their passwords.

Five Password Rules Every User Should Follow - slide 5

When it comes to pre-empting possible breaches in security though, it’s better for employees to come forward if they suspect their accounts are compromised or confidential data has been illegally accessed than to find out on the front page of the morning papers.

Five Password Rules Every User Should Follow - slide 6

Employees are also increasingly accessing their work accounts from remote locations, so users need to be educated on the necessity of changing their passwords regularly.Note, however, that there is a difference between regularly and frequently, and it is important not to overdo the frequency of changes.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.