strong password rules in the workplace

Password Security In The Workplace: 10 Rules

who this class is for

Employees and managers

Test your knowledge with a quick test and earn a free micro-certificate

Shop for etiquette, behavioral, and contextual signs

About this micro-class

Our collective commitment to password security plays a crucial role in safeguarding our company’s assets and maintaining the trust of our clients.

Password Security Rules

1. Complexity is Key

Create passwords that are at least 12 characters long.

Use a mix of uppercase and lowercase letters, numbers, and special characters.

Avoid easily guessable information like birthdays, names, or common words.

2. Unique Passwords

Never reuse passwords across different accounts or systems.

If one account is compromised, having unique passwords ensures that others remain secure.

3. Regular Updates

Change your passwords regularly, ideally every 90 days.

Set reminders to update passwords for critical accounts.

4. Two-Factor Authentication (2FA)

Enable 2FA whenever possible. It adds an extra layer of security, even if your password is compromised.

5. Beware of Phishing

Be cautious of emails or messages asking for your login credentials.

Verify the legitimacy of requests with the IT department before providing any information.

6. Secure Storage

Avoid writing down passwords, especially on sticky notes or easily accessible locations.

Use secure password management tools to store and organize complex passwords.

7. Wi-Fi Security

When connecting to your company’s network remotely, use a secure and encrypted connection.

Avoid accessing sensitive information over public Wi-Fi networks.

8. Password Sharing

Never share your passwords with anyone, including colleagues.

If access is required for a team member, involve IT to set up appropriate permissions.

9. Device Security

devices and company tech equipment and resources

Lock your computer when stepping away, even for a short time.

Use strong passwords or biometric authentication for device access.

10. Report Suspicious Activity

If you notice anything unusual or suspect a security breach, report it immediately to your IT support team.

Test your knowledge with a quick test and earn a free micro-certificate

Shop for etiquette, behavioral, and contextual signs

related micro-classes