Password Policy: What Makes it Strong?

Strong-Password

Passwords can be cracked!  It’s seemingly every few months at most that we hear about a new large-scale data breach, the leaking of personal content, or the hacking of major company servers. Many of these infiltrations can be entirely avoided by taking steps to generate a unique and secure password.

According to a 2015 report by technology journalist Carly Okyle, 90% of employee passwords are crackable within 6 hours. Perhaps the reason why? 65% of people use the same password for all of their web accounts.

This lack of foresight comes with a price. It costs $200,000 for a small business to fix issues post-breach. It has cost an astounding $170m for a single company to recover from a large data breach.

Where Users Go Wrong

When you look at how many of the passwords are stored, it’s not too surprising to understand why these passwords are exposed. 47% of users surveyed by Okyle maintain a spreadsheet to store passwords. 32% rely on memory, 31% use another form of electronic storage, and 27% write their password on paper.

Taking into account the number of casualties caused by these simple lapses of judgement, don’t you think it’s important to understand what constitutes a strong password policy?

Creating a Strong Password

A strong password policy includes the following:

  • At least 8 characters
  • Should not contain personal information
  • Must be unique from previously used passwords
  • Should not contain any word spelled completely
  • One special character
  • One number
  • One upper case letter

While this policy will go a long way in ensuring that your password is secure, nothing is ever impenetrable. Hackers use brute force tools that are trained to make acute password guesses based on common patterns and characters.

Leverage Multiple Security Factors

It’s important to combine the usefulness of a strong password with other security enhancements to maximize the confidentiality of your information. Other safety measures include the use of biometrics, two-factor authentication requiring a security question and answer, and the ability to restrict excessive login attempts.

Security is a top priority for V-Rooms and this enhancement gives our clients even more control over their data room. With virtual data rooms being used in so many different and new ways, our clients’ security needs have also become more varied. V-Rooms gives you customizable solution to fit your needs. Read more here: http://www.v-rooms.com/

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

If you agree to these terms, please click here.