Sunday, June 26, 2022

SIDEBAR: What organizations can do

–Have strong protections in place for any user credentials. At a minimum, passwords should be hashed (converted from plain text) and the databases encrypted. Better still, “salt” passwords by adding random strings before storing them.
–Require users create strong, long passwords.
–Offer enhanced account protections, such as SMS warnings when a user’s account is accessed from a suspect IP address or unknown device.
–Embrace multifactor authentication. If it is not a compulsory mechanism, at least start rolling it out in stages, starting with your most sensitive applications and highest-risk end users.
–Conduct regular audits and security reviews
 
(From CIO.com)

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Related Tech News

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.