{"id":5602,"date":"2024-04-23T11:11:34","date_gmt":"2024-04-23T09:11:34","guid":{"rendered":"https:\/\/www.msb365.blog\/?p=5602"},"modified":"2024-04-23T11:11:34","modified_gmt":"2024-04-23T09:11:34","slug":"msintune-passwords-mfa","status":"publish","type":"post","link":"https:\/\/www.msb365.blog\/?p=5602","title":{"rendered":"The Rising Cybercrime Threat and the Imperative of Robust Password Policies"},"content":{"rendered":"<div class=\"content\" tabindex=\"0\" aria-description=\"\" aria-label=\"Sent by Copilot: **The Rising Cybercrime Threat and the Imperative of Robust Password Policies** In today's digital landscape, businesses are increasingly grappling with the repercussions of cybercrime. Cyberattacks are escalating in frequency, and the resulting damage is growing at an unprecedented rate. Among the most significant vulnerabilities for organizations are their passwords, which serve as the entry point into an account and, consequently, represent the weakest link in their security infrastructure. The initial step towards safeguarding this vulnerability involves the establishment of robust passwords. The most effective way to ensure this is by implementing a stringent password policy within your team. Here, we explore the key components that should be included in an effective password policy. **Random Passwords of Adequate Length** Your password policy should mandate the use of fully randomized passwords, generated by a password generator rather than a human mind. This is because humans tend to create passwords that are easy to remember, but not necessarily resilient against attacks. Such passwords are susceptible to brute-force attacks, where attackers employ software to &quot;guess&quot; users' passwords. However, randomization isn't the only strategy to create robust passwords. Increasing the length of the password, ideally to 16 characters or more, can also enhance its strength. The rationale behind this is simple: the longer the password, the more effort it takes for hackers to crack it. **The Power of Passphrases** While random passwords are secure, they are notoriously difficult to remember. One solution to this problem is the use of passphrases, which strike a balance between password length and memorability. Passphrases are extended sequences of easily remembered words, such as &quot;mortician profusely decent easeful&quot;. The length of the passphrase makes it difficult to crack, while its simplicity makes it easy to remember. Passphrases are particularly useful for unlocking your password manager, which we will discuss later. **Avoid Password Reuse** An essential component of any password policy is the prohibition of password reuse. Each of your accounts should have a unique password, and old passwords should never be recycled. For every new account you create, you should generate a new, random password. The rationale behind this is to prevent credential stuffing, a technique where a hacker uses leaked logins from a major breach and tests them on numerous sites. This type of attack is prevalent and has been implicated in high-profile data leaks. By ensuring that you never reuse passwords, you can effectively neutralize this threat. **Two-Factor Authentication (2FA)** While passwords safeguard your accounts, two-factor authentication (2FA) can safeguard your passwords. In addition to your password (the first factor), 2FA requires a temporary code, typically generated by an app on your phone. To access an account, you need to enter both the password and the code from the 2FA app. Using 2FA means that even if somebody unauthorized were to get access to your password, they would also need to have the phone or other device that has your 2FA app on it to gain entry to your account. 2FA is the best way to defend against phishing attacks. It\u2019s a powerful tool, but sadly underutilized. **Use a Password Manager to Ensure Compliance** Though a good password policy may differ across different teams and companies, these elements are vital to the security of any organization: - Random passwords - Long passwords - Unique passwords - 2FA Of course, this brings to mind another issue, namely how you\u2019re going to manage it all. Remembering long, random passwords is practically impossible \u2014 that\u2019s their strength, after all \u2014 and manually keeping track of them on a piece of paper is not secure. To make sure your team actually implements your password policy, they\u2019ll need a password manager, a piece of software that can store your passwords for you. A good password manager will not just store passwords, but also have a built-in password generator to create random passwords of any length whenever you need them. It will also autofill passwords whenever you log in to a site where you have an account, making password managers not just vital to security, but a massive improvement to your digital quality of life. The best password managers will also alert you when you duplicate passwords across accounts, too, so you don\u2019t fall into the trap of reusing passwords. Rather than have dozens of vulnerabilities, you have only one, and a well-used passphrase can do a great job of protecting that one, too. **Proton Pass and Your Password Policy** We developed Proton Pass as an alternative password manager that does all the above, and then some. Not only can it manage and generate passwords, we also give you the option to generate secure passphrases, in case you need a password that\u2019s easier to remember. It also autosuggests and autofills as you browse, making account admin a lot easier. Proton Pass also offers your organization security in other forms, like through our hide-my-email aliases, which enter a spoofed email address when creating a new online account, offering an extra layer of anonymity. You can also subscribe to our advanced plans and get access to Proton Sentinel, an advanced program that helps protect against phishing attacks. Most importantly, though, Proton Pass for Business has 2FA support built-in, making it much easier for your team members, and organization as a whole, to adopt this vital security tool. Instead of having to deal with cumbersome apps, all your tools are in the same place. Same security, far less hassle. **Microsoft Intune and Conditional Access** In addition to robust password policies, another layer of security can be added through conditional access like compliant devices using Microsoft Intune. This ensures that only trusted users from compliant devices have access to your business data. By setting up policies in Intune, you can control access to your organization's resources based on conditions you specify. These conditions could include user risk, device compliance, or the network location from which access is being attempted. This adds an extra layer of security, ensuring that your organization's data is accessed securely and responsibly.\">\n<div class=\"ac-container ac-adaptiveCard\">\n<div class=\"ac-textBlock\">\n<p>In today\u2019s digital landscape, businesses are increasingly grappling with the repercussions of cybercrime. Cyberattacks are escalating in frequency, and the resulting damage is growing at an unprecedented rate. Among the most significant vulnerabilities for organizations are their passwords, which serve as the entry point into an account and, consequently, represent the weakest link in their security infrastructure.<\/p>\n<p>The initial step towards safeguarding this vulnerability involves the establishment of robust passwords. The most effective way to ensure this is by implementing a stringent password policy within your team. Here, we explore the key components that should be included in an effective password policy.<\/p>\n<h4><strong>Random Passwords of Adequate Length<\/strong><\/h4>\n<p>Your password policy should mandate the use of fully randomized passwords, generated by a password generator rather than a human mind. This is because humans tend to create passwords that are easy to remember, but not necessarily resilient against attacks. Such passwords are susceptible to brute-force attacks, where attackers employ software to \u201cguess\u201d users\u2019 passwords.<\/p>\n<p>However, randomization isn\u2019t the only strategy to create robust passwords. Increasing the length of the password, ideally to 16 characters or more, can also enhance its strength. The rationale behind this is simple: the longer the password, the more effort it takes for hackers to crack it.<\/p>\n<h4><strong>The Power of Passphrases<\/strong><\/h4>\n<p>While random passwords are secure, they are notoriously difficult to remember. One solution to this problem is the use of passphrases, which strike a balance between password length and memorability. Passphrases are extended sequences of easily remembered words, such as \u201cmortician profusely decent easeful\u201d. The length of the passphrase makes it difficult to crack, while its simplicity makes it easy to remember. Passphrases are particularly useful for unlocking your password manager, which we will discuss later.<\/p>\n<h4><strong>Avoid Password Reuse<\/strong><\/h4>\n<p>An essential component of any password policy is the prohibition of password reuse. Each of your accounts should have a unique password, and old passwords should never be recycled. For every new account you create, you should generate a new, random password.<\/p>\n<p>The rationale behind this is to prevent credential stuffing, a technique where a hacker uses leaked logins from a major breach and tests them on numerous sites. This type of attack is prevalent and has been implicated in high-profile data leaks. By ensuring that you never reuse passwords, you can effectively neutralize this threat.<\/p>\n<h4><strong>Multi-Factor Authentication (MFA)<\/strong><\/h4>\n<p>While passwords safeguard your accounts, multi-factor authentication (MFA) can safeguard your passwords. In addition to your password (the first factor), MFA requires a temporary code, typically generated by an app on your phone. To access an account, you need to enter both the password and the code from the MFA app.<\/p>\n<p>Using MFA means that even if somebody unauthorized were to get access to your password, they would also need to have the phone or other device that has your MFA app on it to gain entry to your account. MFA is the best way to defend against phishing attacks. It\u2019s a powerful tool, but sadly underutilized.<\/p>\n<h4><strong>Use a Password Manager to Ensure Compliance<\/strong><\/h4>\n<p>Though a good password policy may differ across different teams and companies, these elements are vital to the security of any organization:<\/p>\n<ul>\n<li>Random passwords<\/li>\n<li>Long passwords<\/li>\n<li>Unique passwords<\/li>\n<li>MFA<\/li>\n<\/ul>\n<p>Of course, this brings to mind another issue, namely how you\u2019re going to manage it all. Remembering long, random passwords is practically impossible \u2014 that\u2019s their strength, after all \u2014 and manually keeping track of them on a piece of paper is not secure.<\/p>\n<p>To make sure your team actually implements your password policy, they\u2019ll need a password manager, a piece of software that can store your passwords for you.<\/p>\n<p>A good password manager will not just store passwords, but also have a built-in password generator to create random passwords of any length whenever you need them. It will also autofill passwords whenever you log in to a site where you have an account, making password managers not just vital to security, but a massive improvement to your digital quality of life.<\/p>\n<p>The best password managers will also alert you when you duplicate passwords across accounts, too, so you don\u2019t fall into the trap of reusing passwords. Rather than have dozens of vulnerabilities, you have only one, and a well-used passphrase can do a great job of protecting that one, too.<\/p>\n<h4><strong>Proton Pass and Your Password Policy<\/strong><\/h4>\n<p>My recommendation (<strong><span style=\"color: #ff0000;\">this is not a paid article<\/span><\/strong>) are products from Proton! They developed Proton Pass as an alternative password manager that does all the above, and then some. Not only can it manage and generate passwords, they also give you the option to generate secure passphrases, in case you need a password that\u2019s easier to remember. It also autosuggests and autofills as you browse, making account admin a lot easier.<\/p>\n<p>Proton Pass also offers your organization security in other forms, like through our hide-my-email aliases, which enter a spoofed email address when creating a new online account, offering an extra layer of anonymity. You can also subscribe to their advanced plans and get access to Proton Sentinel, an advanced program that helps protect against phishing attacks.<\/p>\n<p>Most importantly, though, Proton Pass for Business has MFA support built-in, making it much easier for your team members, and organization as a whole, to adopt this vital security tool. Instead of having to deal with cumbersome apps, all your tools are in the same place. Same security, far less hassle.<\/p>\n<h4><strong>Microsoft Intune and Conditional Access<\/strong><\/h4>\n<p>In addition to robust password policies, another layer of security can be added through conditional access like compliant devices using Microsoft Intune. This ensures that only trusted users from compliant devices have access to your business data. By setting up policies in Intune, you can control access to your organization\u2019s resources based on conditions you specify. These conditions could include user risk, device compliance, or the network location from which access is being attempted. This adds an extra layer of security, ensuring that your organization\u2019s data is accessed securely and responsibly.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital landscape, businesses are increasingly grappling with the repercussions of cybercrime. Cyberattacks are escalating in frequency, and the resulting damage is growing at an unprecedented rate. Among the most significant vulnerabilities for organizations are their passwords, which serve as the entry point into an account and, consequently, represent the weakest link in their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5604,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[12,1923,1988],"tags":[],"class_list":["post-5602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-microsoft-365","category-ms-intune"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/5602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5602"}],"version-history":[{"count":2,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/5602\/revisions"}],"predecessor-version":[{"id":5605,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/5602\/revisions\/5605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/media\/5604"}],"wp:attachment":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}