Fall 2017 issue of Horizons

∙ Vary passwords across websites. This way, if one is compromised, your other account’s remain safe. ∙ Look into third-party services that can help users store passwords. ∙ Do not keep passwords in text files on your computer or on a visible note on your desk.

The creation and enforcement of password policies will help strengthen the security of an organization’s network.

∙ Do not share passwords.

The creation and enforcement of password policies will help strengthen the security of an organization’s network. A good password policy will outline rules and guidelines for password creation.

Software Updates and Patching Updating software is another important aspect of cyber defense. Fixes for security vulnerabilities are often included within software updates, so putting off these installations indefinitely increases the risk of a breach. Encourage fellow employees to follow a smart security practice by updating programs regularly, such as Windows, Microsoft Office and Adobe. It is also important to note a product’s end-of-life date, as some products and services, such as Windows Vista, have already had their last service package released. Products that have already reached their end-of-life stage will no longer receive important security updates, making them vulnerable to attack and a liability for your organization. Passwords Passwords are a prevalent form of authentication. Their prevalence also makes them susceptible to misuse. In theory, passwords should be unique and complex, containing a variety of upper and lowercase letters, numbers and symbols. In reality, users create simple passwords with limited variation in characters that are reused across multiple applications.

Tips for setting up strong password policies:

∙ Configure settings to force password changes every 30, 60, 90 or 120 days, depending on security sensitivity. The more concerned you are about the security of the application, the shorter the interval should be between password resets. ∙ Enforce password history. Password history settings alters the frequency that old passwords can be reused. ∙ Require a minimum password age. If a minimum password age is not enforced, users will be allowed to change passwords immediately, allowing them to circumvent the password history rule. ∙ Set a minimum password length. The longer the password, the more time it takes for a hacker to crack it. It is important for an organization to also consider changing the default passwords of devices. A router, for example, can be installed and fully functional without changing the default password. Default passwords can easily be guessed or found online, and if left unchanged, can provide an easy way for intruders to access your network.

Common password best practices include:

∙ Use a combination of letters, symbols and numbers in your password. Do not base this combination on significant events, holidays, birthdays, etc.

Cyber Security Effects in Today’s Fundraising

42

Made with FlippingBook - Online Brochure Maker