Intelligent CIO Africa Issue 28 | Page 15

LATEST INTELLIGENCE PASSWORD SECURITY BEST PRACTICES FOR BUSINESS PRESENTED BY P assword Security Standards & Policies for Business Organizations spend millions of dollars on cybersecurity defenses and consultants. Beyond traditional tools like firewalls, anti-virus, and system information and event management (SIEM), it is easy to get caught up in sophisticated threat detection using artificial intelligence, machine learning, user behavior, and analytics. All of these tools have their place and are very valuable; however, one problem looms large: Passwords are frequently the only thing protecting confidential business plans, intellectual property, communications, network access, employee census information and customer data. Due to human error, negligence, and simple lack of knowledge, passwords are the weakest link in security. Attacking those issues head on will provide maximum return on investment. Implementing a Password Security Policy – A Two Step Process The first step in virtually every cybersecurity framework is to take an inventory of your assets and then determine the risk of losing each of those assets. The second step is to implement policies according to the risk levels assigned to those assets. The most critical part of these policies is access control. Given that passwords will be an integral part of any access control policy, password security policies must be put into place. An effective password security policy entails making sure employees create strong passwords, do not reuse them, store passwords on authorized company devices, and implement 2FA. Using a password manager to store passwords for all applications is the only way this can currently be accomplished. n Download whitepapers free from www.intelligentcio.com/me/whitepapers/ www.intelligentcio.com INTELLIGENTCIO 15