Every password you use can be thought of as a needle hiding in a
haystack. After all searches of information relating personally to
you (Wife’s name, Kid’s name, Birthdays, etc.), common passwords,
and dictionaries have failed, an attacker must then resort to a
“brute force” search – ultimately trying every possible combination
of letters, numbers and then symbols until the combination you
chose, is discovered. How long this “brute force” attack takes to
crack your password is a very simple product of exponential math.
Short passwords crack very fast and long passwords can take so long
to crack that none of us would be around for it to matter anyway.
Every character you add to your password makes it take exponentially
longer to crack.
Updates to Etairos HVAC company password policy:
-
All employee passwords, used for company purposes, must be at
least 12 characters in length and unique. Do not re-use the
same password on multiple services/systems.
-
Our network/VPN will enforce the full 12-character length.
-
While Office 365 will not enforce the full 12-character
length, company policy still dictates it, and we are all
expected to comply.
-
All employee passwords must be ‘Strong’. Strong passwords
consist of a combination of uppercase and lowercase letters,
numbers, and special symbols, such as punctuation, and should
be at least 12 characters long.
-
Our systems try to prevent the use of weak passwords, but they
do not know us ‘personally’. Even if our systems accept a weak
password, it is our personal responsibility to make sure the
password is ‘Strong’ and meets this policy.
-
Don’t think of a password as a single word. Consider using a
passphrase. The whole point of using passphrases is to adopt a
much more you-friendly approach to password design.
-
For example, the passphrase, $torm_Tr00pers=BadSHOTS! Is 24
characters long, easy to remember, contains upper- and
lower-case letters, numbers, and special characters, and would
take 93.83 billion trillion trillion centuries to crack
(assuming 1,000 guesses per second). Note that typical attacks
will be online password guessing limited to, at most, a few
hundred guesses per second.
-
Your network/VPN password must be different than
your Office 365 password. This is to ensure that if you get hacked
on one system, that same password can’t be used to access our
other systems.
-
Do not use any password that you have
established for company use on non-company or personal websites.
It is impossible for us to determine the security of every website
a person may use.
If your company passwords are used on an
insecure site and it gets stolen, it is possible that may open the
door to a company asset being hacked.
-
Due to these new policies, we are changing both Office 365 and our
network/VPN to only require you to change your passwords every 190
days.
-
When changing your password, the change must be substantial. Only
changing 1 or 2 characters or increasing a number by 1 defeats the
whole purpose of changing it.
-
No policy can dictate every aspect
of common sense. It is our company policy that everyone does
everything they can to protect unauthorized access to your
company laptop, cell phone, our network/VPN, our Office 365,
and any other company IT asset/service.
-
Your password should not contain any
information that is related to you or your family personally.
-
Your cell phone should have at least
a 6-digit passcode to lock it and preferably face ID (or
equivalent to make it easier on you) to prevent unauthorized
use. Your cell phone should be configured for the screen to
lock within a reasonable amount of time otherwise the
protection is never engaged.
-
Always be mindful of where your
laptop is. Do not leave it in the office, on a jobsite, or in
your car where it could get stolen. Your laptop should also be
configured for the screen to lock within a reasonable amount
of time so that it is also protected.
-
Do not share any company passwords
with anyone else. This is just like each of us having our own
individual alarm code that is also not to be shared.
-
Anytime there is a security breach of any type, the IT
department is required to investigate and report any findings
to upper Management. Please make sure you have done your part
on following this policy.
Please consult this website for more information and help:
https://cybernews.com/best-password-managers/how-to-create-a-strong-password/
It is full of correct and valuable information. If you follow the
advice on this website, you will absolutely be in compliance with both
common sense and company policy. It presents multiple strategies and
ideas to help you protect both company and even your personal best
interests. Please feel free to pick a strategy that will work the best
for you. Kevin and I are also here to help you in any way that we can.
These strong password strategies can be customized to fit anyone’s
personality and interests. This is not something that has to be overly
hard or difficult.
|