MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Strong-Passwords-Strong-Enough-Devolutions

Strong Passwords Are Essential — But Not Enough

An estimated 81% of hacking-related data breaches are due to weak passwords, which have one or more of these characteristics: ,Composed only of numbers ,Composed only of letters ,Too short ,Uses a p...

An estimated 81% of hacking-related data breaches are due to weak passwords, which have one or more of these characteristics:

On the other end of the spectrum are strong passwords, which have all of these characteristics:

Ideally, using strong passwords would be enough to lock down accounts and network access. However, that isn’t always the case. Some end users undermine security and put the organization at risk by:

This means that while strong passwords are essential — and long, unique passphrases are even better — they are not enough to protect endpoints, networks and organizations. Here are 5 things that should also be part of the security puzzle:

1. End User Training

70% of employees don’t understand basic cybersecurity. As such, organizations need to create a culture of security awareness by providing adequate, ongoing end-user training through various methods (e.g. presentations, videos, articles, one-on-one coaching, etc.) that highlight risks like phishing. Some organizations are also enrolling end users in online cybersecurity courses so they can grasp the fundamentals.

2. Two-Factor Authentication (2FA)

2FA combines something end users know (e.g. username + password) with something they have (e.g. a device) or something they are (e.g. biometric). While 2FA is not bulletproof, it adds an important layer of authentication — and when combined with Single Sign-On (SSO), it makes life much easier for administrators. Note: if you are exploring various 2FA solutions for your organization, we invite you to read our reviews of some of the most popular options.

3. Centralized Password Management Platform

A robust centralized password management platform like Devolutions Password Server or Devolutions Hub enables your organization to:

Due to security fatigue, lack of awareness, and sometimes just plain laziness, research has found that when end users reset their passwords, they often choose weaker ones rather than stronger ones. As such, a growing number of organizations are either eliminating the practice, or they are dialing back the frequency of password resets. For example, instead of forcing end users to reset their password(s) once every three months, they are mandating it once a year.

4. Privileged Access Management (PAM)

88% of companies with more than 1 million folders lack appropriate access limitations, and 58% of companies have more than 100,000 folders accessible to all employees. Having a PAM tool, as well as the right technologies and policies in place, can significantly reduce the size of the threat surface. Here is a list of best practices to follow:

5. Patch and Vulnerability Management

Unpatched and outdated software is responsible for 22% of data hacks. Here is a list of best practices for addressing this gap:

A survey of 600 IT decision-makers has revealed that 67% do not believe their IT Operations teams and IT Security teams work in a cohesive manner. As a result, there is a lack of basic security hygiene in the organization.

Advice from Our CSO Martin Lemay

“Consider avoiding exposing systems directly to the Internet. Although you might have strong passwords and a good patch management lifecycle – and 0-day exploits – undiscovered threats might still be able to penetrate them and expose the environment to unnecessary risks. IP restriction strategies and VPN technologies can also help avoid such situations. If there are systems that must be exposed directly to the Internet, implement detailed auditing technologies to detect malicious activities.”

More from Security

Read more articles