Intelligent Data Centres Issue 02 | Page 15

LATEST INTELLIGENCE PRESENTED BY PASSWORD SECURITY BEST PRACTICES FOR BUSINESS Password Security Standards & Policies for Business security. Attacking those issues head on will provide maximum return on investment. Organizations spend millions of dollars on cybersecurity defenses and consultants. Beyond traditional tools like firewalls, anti-virus and system information and event management (SIEM), it is easy to get caught up in sophisticated threat detection using artificial intelligence, machine learning, user behavior and analytics. All of these tools have their place and are very valuable; however, one problem looms large. Implementing a password security policy – a two step process Passwords are frequently the only thing protecting confidential business plans, intellectual property, communications, network access, employee census information and customer data. Due to human error, negligence and simple lack of knowledge, passwords are the weakest link in www.intelligentdatacentres.com Step one: The first step in virtually every cybersecurity framework is to take an inventory of your assets and then determine the risk of losing each of those assets. Step two: The second step is to implement policies according to the risk levels assigned to those assets. The most critical part of these policies is access control. Given that passwords will be an integral part of any access control policy, password security policies must be put into place. ◊ Issue 02 15