According to
research by Cisco, the readiness of over half of the world's companies for cyberattacks is below average. Experts agree that one of the main security threats to both personal and corporate accounts is unawareness of the threat. The simplest example: weak passwords. Users don't want to bother themselves with memorizing a long and meaningless combination of letters, numbers, and symbols, so they use passwords for personal and work accounts based on their pet's birthdate or the last digits of their home phone number.
There is no simple solution here. We recommend working with employees along two lines of actions.
The first is to explain the value of data itself. Unfortunately, the most common reason for careless attitudes towards computer security is a lack of understanding of the existing risks. People often think, "We're not a bank, who would be interested in our data anyway..." Meanwhile, scammers are demanding ransom for the
data of schoolchildren's social insurance or
hospital patients. And these trends in cybercrime will only gain momentum.
The second task is to inform the team about the existing methods of hacking. If you are responsible for security in a young and progressive team and believe that there is no need to inform the team about the dangers of opening "happy emails" or cases with flash drives of unknown origin, you are mistaken. Even technically skilled specialists can fall victim.
In Deskie, you can allow agents to come up with their own account password, or you can
add agent's data in bulk when creating an account and set the login parameters as you see fit.
Take into account the general recommendations for creating passwords:
- the password should contain a minimum number of characters (recommended 15-20);
- it should include a combination of lowercase and uppercase letters;
- it should contain numbers and special characters.
However, relying only on a complex password and the prudence of your employees is not recommended. Even the most complex password can be stolen or hacked, so a combination of methods is more important.