cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
Interviews, IT and Technology News India | CXO VOICE
No Result
View All Result
Home News Cyber Security

6 Best Password Security Guidelines to follow

Deepa Sharma by Deepa Sharma
May 17, 2019
Reading Time: 3 mins read
Password Security Guidelines
Share on FacebookShare on TwitterShare on Linkedin

In this digital era, you might have to protect many devices and accounts, In many cases one just go with random common password. You should not give a chance to cyber criminals to enter into your accounts, week and random used passwords are the main cause of many data breaches and hacks in 2018. Cyber security company Fortinet issued password security guidelines for its team members and stakeholders to go with a password strategy to protect corporate data.

According to the Verizon Data Breach Investigations Report, 81% of breaches leveraged either stolen and/or weak passwords. That problem is compounded because one of the biggest risks to data security is the reuse of passwords across accounts. If one of the accounts is compromised and your user name and password are posted on the dark web, cybercriminals who know how often passwords are reused will simply begin to plug that information into other possible accounts until they unlock one that uses the exact same credentials.

Hackers are advancing with advancement of technology. Easy Short password carries big risk with it, and for the hackers it won’t take much effort and technology to crack it. In fact, hackers maintain databases of the most common used words, phrases, and number combinations that they can run your password through to find a quick match.

Password security guidelines by fortinet Rajesh maurya

To protect your password security you need to make it strong, and must avoid direct names, sequencing numbers, date of birth etc. To make your data and accounts secure, you need to follow below password security guidelines.

6 Best Password Security Guidelines

1. Adding extra layer of security and multi factor authentication always preferable, go with it wherever it is applicable. This confirms your identity by utilizing a combination of multiple different factors, such as something you know or something they have, such as a token generator on your smartphone.

2. Each account must have different password, do not repeat one password for multiple accounts.

3. At least in every three months you should Change your passphrase. This will lock out cybercriminals who may be using your account, protect you from brute force attacks, and remedy the issue caused by cybercriminals who purchase lists of usernames and passwords obtained through data breaches.

4. Maintain the privacy when you enter the password, ensure no one is watching.

5. Be cautious when downloading files from the internet as they may contain key loggers as well as password grabber malware variants that will compromise your password. A good practice is to regularly scan for the presence of such malware.

6. Use a cloud-based password manager to enable you to create and store strong passphrases. This is especially important if you require strong passwords for dozens of accounts. Password management tools allow you to securely store an encrypted list of passwords in the cloud that can be accessed from any device. Not only will you only need to remember one password to access your password locker, the passwords you store there for your various accounts can be even stronger because you don’t have to remember them.

10 most common online passwords

  1. Password1
  2. Welcome1
  3. P@ssword
  4. Summer1
  5. password
  6. Fa$hion1
  7. Hello123
  8. Welcome123
  9. 123456
  10. 123456q@
Tags: Data ProtectionfortinetPassword SecurityPassword Security Guidelines
Deepa Sharma

Deepa Sharma

Senior Writer and Editor at CXO VOICE, She covers technology, cybersecurity, and financial and other tech news and updates. She can be reached at "deepa@cxovoice.com"

Related Posts

Cloud Data Protection
Cyber Security

Data Protection, a Key Part of Business Continuity

April 18, 2022
Data loss
Cyber Security

In 2020, more than 50% of Indian companies faced downtime due to data loss: Acronis

April 5, 2021
Data security for enterprises
Cyber Security

Six Data Security Tips for Enterprises

June 17, 2020
Cyber and Data Protection
Cyber Security

Arcserve and Sophos Introduce Fully Integrated Security and Data Protection Solution

May 20, 2020
Data Protection and Compliance While Working From Home
COVID-19

Data Protection and Compliance While Working From Home

April 1, 2020
data protection
Banking

Data Protection Guide for Banking and Financial Firms

February 5, 2020
Data Protection
Cyber Security

Data Protection Guide for Educational Institutions

February 3, 2020
digital transformation and Data Protection
Cyber Security

Digital Transformation Journey and Data Protection

January 15, 2020
Load More
Next Post
effective Corporate Culture in organization

5 Effective Ways to Maintain Healthy Corporate Culture

ADVERTISEMENT

Expert Views

Jaganathan Chelliah
Technology

Installing CCTV Cameras? Here is What You Need to Know

May 17, 2022
Wipro's Digital Database Services (DDS)
Banking

Cloud trends in the BFSI sector set to drive digital transformation in the new financial year

April 26, 2022
Cloud Data Protection
Cyber Security

Data Protection, a Key Part of Business Continuity

April 18, 2022
AI Cloud Enterprises
AI

What can AI Cloud do for Enterprises?

March 9, 2022
Data Modernisation
Technology

4 Key Trends Driving Data Modernization Across The Enterprises

January 28, 2022

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Enterprises, and MSMEs IoT
Leaders Talk

IoT is now seen as an essential enabler for the enterprises to be future ready : Joyjeet Bose

-
Security While Working Remotely interview with Filip Coftas
Cyber Security

Security While Working Remotely [Interview]

-
Akita Security Device Help you Protect your Security During COVID-19 [Interview with Zakir Hussain]
COVID-19

Can Akita Security Device Help you Protect your Security During COVID-19 [Interview]

-
digital transformation and customer experience Newgen software
Interview

Digital Transformation Journey helps Newgen Software Improve Customer Experience [Interview]

-

Entrepreneur

Top 10 Richest Persons In India

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXO VOICE is a premier resource for the enterprises, SMBs and Startups CXOs and business leaders, It enables CXOs and business executives gain access key insights, experts views, analysis, business strategy, and leaders interviews on what’s happening in the market and its impact.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com

Newsletter

Subscribe to our mailing list to receives newsletter direct to your inbox!

  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2022 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security

© 2022 CXO VOICE