What role does employee training play in your company’s cybersecurity?
Technology helps, but people remain the main vulnerability in a company’s cybersecurity.
How should companies manage shared accounts?
Shared accounts are a frequent problem in the business world. In cybersecurity we always say that the user
What is a phishing attack and how does it affect password management?
Phishing is a technique in which attackers impersonate a trusted entity
Is it safe to store passwords in documents or notes on the computer?
No. Storing them in text files, spreadsheets or unprotected notes is very risky, since anyone who accesses the computer
What characteristics should a strong password have?
A good password should be long (today the minimum is usually 12 characters, but over time this number will surely increase)
How often should passwords be changed?
Passwords can become compromised, whether through attacks on the services we use or breaches of our organization.
Is it enough to have a good password or is it also necessary to use multi-factor authentication (MFA) or two-factor authentication (2FA)?
A strong password is essential, but it does not guarantee total protection. If someone manages to steal that key (through phishing, malware, breach…)
What tools help to manage passwords securely?
Currently there are multiple password manager options. These programs store all passwords in an encrypted “safe”
Is it advisable to use the same password for different services?
No. Reusing passwords is one of the most frequent and dangerous mistakes. If a service suffers a breach, that password can be incorporated into dictionaries
Why is it important to manage passwords well in a business?
Passwords are the first barrier of protection for our data, regardless of its type (tax, banking, operational…)