Intelligent CISO Issue 12 | Page 16

latest intelligence PASSWORD SECURITY BEST PRACTICES FOR BUSINESS P Password Security Standards & Policies for Business PRESENTED BY Organizations spend millions of dollars on cybersecurity defenses and consultants. Beyond traditional tools like firewalls, anti-virus and system information and event management (SIEM), it is easy to get caught up in sophisticated threat detection using artificial intelligence, machine learning, user behavior and analytics. All of these tools have their place and are very valuable; however, one problem looms large. DOWNLOAD WHITEPAPERS AT: WWW.INTELLIGENTCISO.COM/ WHITEPAPERS 16 Passwords are frequently the only thing protecting confidential business plans, intellectual property, communications, network access, employee census information and customer data. Due to human error, negligence and simple lack of knowledge, passwords are the weakest link in security. Attacking those issues head on will provide maximum return on investment. Implementing a password security policy – a two step process Step one: The first step in virtually every cybersecurity framework is to take an inventory of your assets and then determine the risk of losing each of those assets. Step two: The second step is to implement policies according to the risk levels assigned to those assets. The most critical part of these policies is access control. Given that passwords will be an integral part of any access control policy, password security policies must be put into place. u Issue 12 | www.intelligentciso.com