MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Importance of using password manager devolutions blog

The Importance of Using a Password Manager

Recently, Devolutions surveyed decision-makers in SMBs worldwide on a variety of key cybersecurity practices and trends. Answers to each question are presented in this report and highlighted in this i...

Photo of Laurence Cadieux Laurence Cadieux

Recently, Devolutions surveyed decision-makers in SMBs worldwide on a variety of key cybersecurity practices and trends. Answers to each question are presented in this report and highlighted in this infographic.

One key takeaway from the survey is how some SMBs are — and some aren’t — using a password manager. So it’s a “bad news, good news” kind of story. Let’s start with the former:

The Bad:

The Good:

The Solution

There are three things that all SMBs should be doing to keep their data, customers, and reputations safe: use a password manager, implement best practices, and educate end users.

1. Use a Password Manager

The first (and most obvious) thing is to use a password manager — a corporate version for the organization, and a personal version for each end user to store their non-business credentials and other sensitive information. Research has shown that 81% of data breaches are caused by compromised, weak, and re-used passwords, while 29% of all breaches (regardless of attack type) involve the use of stolen credentials.

At Devolutions, we offer Password Hub Business for organizations, and Password Hub Personal for end users:

2. Implement Password Management Best Practices

Here are some of the password management best practices that SMBs should implement right now:

3. Educate End Users

An effective and affordable way to help end users be part of the solution — instead of unintentionally contributing to the problem — is through a cybersecurity training platform. This is a portal that provides end users with self-paced, hands-on, skills-based threat detection and mitigation training in a live and dynamic simulated environment. Threats can include ransomware, phishing, DDoS, and so on, and the training program can be customized to cover specific topics, such as social engineering, email security, mobile device security, safe web browsing, safe social networking, protection of health information, etc. Plus, supervisors and managers can track each end user’s progress and development, and provide additional coaching or resources as required.

Read the Report

We invite you to download the State of Cybersecurity in SMBs in 2020-2021 report here, and view the accompanying infographic that highlights our key findings.

More from Security

Read more articles