{"id":4958,"date":"2019-05-19T22:51:10","date_gmt":"2019-05-19T21:51:10","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4958"},"modified":"2021-05-31T12:50:00","modified_gmt":"2021-05-31T11:50:00","slug":"password-management","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/password-management","title":{"rendered":"Password management\u2014A quick best practice guide"},"content":{"rendered":"<p>Effective password management is a necessary evil when managing IT systems. Although users often fail to see the importance of complex passwords, there are several reasons they are essential:<\/p>\n<ol>\n<li><a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/password-management-network-security\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Network Security<\/strong><\/a><br \/>\nWeak passwords give hackers an easy way into the infrastructure. As most modern systems have some level of remote access, this issue cannot be ignored.<\/li>\n<li><strong>Accountability<\/strong><br \/>\nUser authentication helps the IT department see who has done what on company systems. If password security isn\u2019t taken seriously, no one can be sure that users aren\u2019t using each other\u2019s passwords.<\/li>\n<li><strong>Internal Confidentiality<\/strong><br \/>\nBreaches in confidentiality can result from little more than a password that is common knowledge or a password written on a Post-it note attached to a user\u2019s monitor.<\/li>\n<\/ol>\n<h3><strong>A bad attitude to passwords<\/strong><\/h3>\n<p>If you\u2019ve been in the IT business for any length of time, you\u2019ve inevitably come across clients who don\u2019t really take password security very seriously. Some individuals genuinely believe the risk of security breaches is overstated.<\/p>\n<p>You\u2019ve probably come across all kinds of views on passwords. Some IT consultants even encounter company bosses who insist all passwords (sometimes with the exception of their own) are exactly the same. These bosses are blind to the fact that a security breach is often as likely to be caused by a disgruntled former staff member as someone outside the organization.<\/p>\n<p>If you still have clients who are stubborn about the importance of password restrictions, the most recent list of \u201cbad passwords\u201d should give you some ammunition to help convince them they should take things more seriously.<\/p>\n<p>Here are the\u00a0<a class=\"ext\" href=\"https:\/\/www.teamsid.com\/splashdatas-top-100-worst-passwords-of-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">most commonly used \u201cbad\u201d passwords in 2018<\/a>, as compiled by\u00a0SplashData:<\/p>\n<ol>\n<li>123456<\/li>\n<li>password<\/li>\n<li>123456789<\/li>\n<li>12345678<\/li>\n<li>12345<\/li>\n<li>111111<\/li>\n<li>1234567<\/li>\n<li>sunshine<\/li>\n<li>qwerty<\/li>\n<li>iloveyou<\/li>\n<li>princess<\/li>\n<li>admin<\/li>\n<li>welcome<\/li>\n<li>666666<\/li>\n<li>abc123<\/li>\n<li>football<\/li>\n<li>123123<\/li>\n<li>monkey<\/li>\n<li>654321<\/li>\n<li>!@#$%^&amp;amp;*<\/li>\n<\/ol>\n<p>People certainly like those number-based passwords don\u2019t they? While it\u2019s pleasing to finally see the techie\u2019s old favorite of \u201cTrustNoOne\u201d disappear from the top 10, the presence of \u201cpassword\u201d consistently at number two is rather depressing.<\/p>\n<p>As an IT professional, you\u2019re probably in a position of trust where you know quite a few of your clients\u2019 passwords. Are any of them using any from the top 10 list? Even worse, are you? If so, shame on you! Go change them now.<\/p>\n<h3>Setting policies for password management<\/h3>\n<p>You need to set and enforce rigid password management policies for your customer\u2019s businesses to <a href=\"\/features\/password-management-software\">remain secure<\/a>. Most IT systems and servers allow network administrators to set detailed password policies dictating how complex each password should be and how often it must be changed.<\/p>\n<p>When configuring these settings, it\u2019s important to strike an effective balance between IT security and how much complexity users can realistically handle.<\/p>\n<p>Interestingly, the United States National Institute for Standards and Technology (NIST) has just revised its recommendations on passwords, and much of the previous thinking has been thrown out in favor of a more user-friendly approach. So if you\u2019re planning to set a policy, take these into consideration. The NIST password guidelines are important because they are the password policies that are set across the whole of the US public sector. They are often very sensible and provide a great template for all organizations and application-development programs.<\/p>\n<p>Here\u2019s what NIST currently recommends\u2014some of which may surprise you. There\u2019s more than this to it (which you can find\u00a0<a class=\"ext\" href=\"https:\/\/www.slideshare.net\/jim_fenton\/toward-better-password-requirements\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>\u00a0in this presentation from PasswordCon), but this is what\u2019s likely to be most important to MSPs.<\/p>\n<ul>\n<li><b>Favor the user<\/b>The NIST guidelines say password policies\u00a0should be user friendly\u00a0and put the\u00a0burden on the verifier\u00a0when possible.\u00a0A lot of research has gone into the efficacy of many of our \u201cbest practices\u201d for passwords, and it turns out they aren\u2019t worth the pain.<\/li>\n<li><b>The bigger, the better<\/b>The new guidelines also suggest a minimum of 8 characters, but that you should allow for a maximum of at least 64 characters.\u00a0Applications must also allow all printable ASCII characters, including spaces, and should accept all UNICODE characters, too, including emojis.<\/li>\n<li><b>Forget composition rules<\/b>As a follow on from the above, you should not set forced rules about using particular character combinations. So no more \u201cyour password must contain one lowercase letter, one uppercase letter, one number, four symbols, but not etc.\u201d\u00a0People should be allowed to choose freely, and you should encourage longer phrases.<\/li>\n<li><b>No hints<\/b>Basically people tend to set password hints that are too obvious, so this is seen as just too risky.<\/li>\n<li><b>No more expiration without reason<\/b>Contrary to what you\u2019ve no doubt been telling customers for years, NIST now states that the only time passwords should be reset is if there is a solid reason. For example, if they have been forgotten, if they have been phished, or if you think (or know) that a password database has been stolen. This will please a lot of users.<\/li>\n<li><b>SMS should not be used as part of 2FA<\/b>While two-factor authentication (2FA) is still important, SMS should not be part of the 2FA process. There are many problems with the security of SMS delivery, including malware that can redirect text messages, attacks against the mobile phone network, and SIM swapping.<\/li>\n<\/ul>\n<p>Some things still hold true, so consider the following when determining a password strategy:<\/p>\n<ol>\n<li>Enforce a level of complexity that is sufficient to make passwords hard to crack via software, without annoying users.<\/li>\n<li>Insist on a different password for each IT system\u2014i.e., one for logon, one for VPN, one for databases.<\/li>\n<li>Avoid the use of shared or commonly known passwords.<\/li>\n<li>Educate staff on the importance of password management and the possible implications if the password policy is ignored. Help users realize that an assortment of letters, numbers, and punctuation doesn\u2019t need to be difficult\u2014it can be as simple as a name with a year and a full stop at the end.<\/li>\n<li>Work with management to do occasional \u201csweeps\u201d for human threats to network security, such as passwords on Post-it notes and passwords being shared.<\/li>\n<li>Consider occasional \u201csocial engineering\u201d tests to see if staff can be fooled into giving up passwords via email or telephone. You can then use the results of these tests to further enforce training on the importance of IT security.<\/li>\n<\/ol>\n<h3>Some additional advice<\/h3>\n<p>There are a few other things to take note of when managing the password management process.<\/p>\n<p>Password managers can really help. Having a password manager installed means you can access all the systems you need from one main point. This can help remove the burden of complex passwords\u2014users only need to remember one complex password as opposed to several.<\/p>\n<p>Conditional access is a step up from 2FA\/MFA (multifactor authentication). Conditional access models look for abnormal connections, and then put MFA in place when things fall outside the conditions that you\u2019ve set.\u00a0Microsoft has now implemented conditional access for its SaaS and Azure applications like O365.<\/p>\n<p>Password management doesn\u2019t have to be a chore if you have user buy-in regarding its importance. The way to achieve this is by communicating effectively with staff and striking a good balance between security and convenience. And don\u2019t forget using a\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/cloud-based-password-manager\" target=\"_blank\" rel=\"noopener noreferrer\">password manager<\/a>\u2014that can really alleviate a lot of the burden on employees.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Built for MSPs by MSPs, SolarWinds Passportal + Documentation Manager is an encrypted and efficient password and\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/credential-management-system\" target=\"_blank\" rel=\"noopener noreferrer\">credential management solution<\/a>, offering credential injection, reporting, auditing, password change automation and privileged client documentation capabilities\u2014designed to streamline the technicians\u2019 day by providing essential documentation at their fingertips to standardize service delivery and expedite issue resolution.<\/strong><\/p>\n<p><strong>SolarWinds Passportal can help you manage risk, shorten incident resolution times, meet compliance for credential creation, usage, and storage. To find out more\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">click here<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Effective password management is a necessary evil when managing IT systems. Although users often fail to see the importance of complex passwords, there are several reasons they are essential.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4958","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Password management\u2014A quick best practice guide - N-able<\/title>\n<meta name=\"description\" content=\"If you haven&#039;t started guiding your customers through the murky waters of password management, then you need to start now. It doesn\u2019t have to be a chore.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/password-management\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password management\u2014A quick best practice guide - N-able\" \/>\n<meta property=\"og:description\" content=\"If you haven&#039;t started guiding your customers through the murky waters of password management, then you need to start now. It doesn\u2019t have to be a chore.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/password-management\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-19T21:51:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-31T11:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/password-management#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/password-management\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Password management\u2014A quick best practice guide\",\"datePublished\":\"2019-05-19T22:51:10+01:00\",\"dateModified\":\"2021-05-31T11:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/password-management\"},\"wordCount\":1284,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/password-management\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/password-management\",\"name\":\"Password management\u2014A quick best practice guide - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2019-05-19T22:51:10+01:00\",\"dateModified\":\"2021-05-31T11:50:00+00:00\",\"description\":\"If you haven't started guiding your customers through the murky waters of password management, then you need to start now. It doesn\u2019t have to be a chore.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/password-management#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/password-management\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/password-management#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Password management\u2014A quick best practice guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Password management\u2014A quick best practice guide - N-able","description":"If you haven't started guiding your customers through the murky waters of password management, then you need to start now. It doesn\u2019t have to be a chore.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/password-management","og_locale":"es_ES","og_type":"article","og_title":"Password management\u2014A quick best practice guide - N-able","og_description":"If you haven't started guiding your customers through the murky waters of password management, then you need to start now. It doesn\u2019t have to be a chore.","og_url":"https:\/\/www.n-able.com\/es\/blog\/password-management","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-05-19T21:51:10+00:00","article_modified_time":"2021-05-31T11:50:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/password-management#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/password-management"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Password management\u2014A quick best practice guide","datePublished":"2019-05-19T22:51:10+01:00","dateModified":"2021-05-31T11:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/password-management"},"wordCount":1284,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/password-management","url":"https:\/\/www.n-able.com\/es\/blog\/password-management","name":"Password management\u2014A quick best practice guide - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2019-05-19T22:51:10+01:00","dateModified":"2021-05-31T11:50:00+00:00","description":"If you haven't started guiding your customers through the murky waters of password management, then you need to start now. It doesn\u2019t have to be a chore.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/password-management#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/password-management"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/password-management#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Password management\u2014A quick best practice guide"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/4958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=4958"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/4958\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=4958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}