Five Password Rules Every User Should Follow - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Regular Password Changes Are Necessary-6 Next

Regular Password Changes Are Necessary

Employees are also increasingly accessing their work accounts from remote locations, so users need to be educated on the necessity of changing their passwords regularly.Note, however, that there is a difference between regularly and frequently, and it is important not to overdo the frequency of changes.

Our SMB Blogger Paul Mah is always reminding you how important proper training is for small and medium-sized businesses. This is especially true when it comes to proper security practices for staffers. Passwords are typically the first line of defense against unauthorized access, and Paul highlights some pointers about password management that all employees should know about. (To get a complete overview of these tip, be sure to check out Paul's blog post.)

Hopefully, knowing why certain policies are enacted will prompt employees to follow them. In this slideshow, Paul highlights five aspects of good password management that employees should know about.

More Slideshows:


11 Work-Related iPad Apps Worth a Look The sexy Apple tablet already has a growing fleet of business software on the market.

Ten Reasons to Upgrade to Windows 7 So what are some of the practical things to like about Windows 7?


Now Hiring: Top 10 In-Demand Tech Skills Two-thirds of those surveyed by Dice.com said they had at least one hard-to-fill position available.

 

Related Topics : Semantic Web

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.