{"id":45088,"date":"2023-05-04T09:00:28","date_gmt":"2023-05-04T08:00:28","guid":{"rendered":"https:\/\/www.n-able.com\/?p=45088"},"modified":"2025-05-23T14:06:40","modified_gmt":"2025-05-23T13:06:40","slug":"how-password-managers-help-meet-cybersecurity-requirements","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements","title":{"rendered":"How Password Managers Help Meet Cybersecurity Requirements"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">The first Thursday in May is World Password Day. This is a good opportunity to look at your cybersecurity practices and privileged access strategies.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">As <a href=\"https:\/\/www.n-able.com\/resources\/the-new-threat-landscape-pushing-msp-security-to-the-next-level\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">cyberattacks increase<\/span><\/a>, more organizations are choosing to get some peace of mind by acquiring cyber insurance to mitigate liability and losses in case of an attack. However, <a href=\"https:\/\/www.n-able.com\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">getting cyber insurance<\/span><\/a> may not be an easy exercise. Due to increasing numbers of claims over the past few years, insurance companies have reworked the criteria for acquiring cyber insurance and required organizations to demonstrate their ability to fend off ransomware attacks with a wide array of security controls. <\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">What requirements must be met to qualify for cyber insurance coverage?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Common cyber security insurance eligibility requirements include:<\/span><\/p>\n<ul>\n<li class=\"p4\"><span class=\"s1\">Antivirus software installed on all PCs<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Patch management to ensure critical updates are applied on time<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Firewall protection for the company network<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Backup and data protection using a secure cloud service<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Regular vulnerability scanning or penetration tests<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Endpoint protection and intrusion detection to stop attacks<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Official certifications such as <a href=\"https:\/\/www.tenfold-security.com\/en\/iso-27001-compliance\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">ISO 27001<\/span><\/a> or <a href=\"https:\/\/www.tenfold-security.com\/en\/nist-csf-compliance\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">NIST CSF compliance<\/span><\/a><\/span><\/li>\n<li class=\"p4\"><span class=\"s4\"><a href=\"https:\/\/www.n-able.com\/blog\/how-to-apply-2fa-policy-in-your-organization\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Multi-factor authentication<\/span><\/a><\/span><span class=\"s1\"> for admin and other privileged accounts<\/span><\/li>\n<li class=\"p5\"><span class=\"s7\">Actively managed and <a href=\"https:\/\/www.n-able.com\/blog\/why-should-you-audit-privileged-access-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">routinely audited user accounts and permissions<\/span><\/a><\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Regular security training for employees<\/span><\/li>\n<\/ul>\n<p class=\"p7\"><span class=\"s1\">The goal of cyber insurance requirements is to increase resilience of different attach surfaces within the business\u2019 environment. The last three items on the list are related to the identity attack surface and the human risk.<\/span><\/p>\n<h2 class=\"p7\"><span class=\"s1\">A Security Reality Check<\/span><\/h2>\n<p class=\"p7\"><span class=\"s1\">A <a href=\"https:\/\/www.nass.org\/sites\/default\/files\/2020-04\/Yubico%20Report%20Ponemon%202020%20State%20of%20Password%20and%20Authentication%20Security%20Behaviors.pdf\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">2020 Ponemon and Yubico survey<\/span><\/a> uncovered the following worrying trends when it comes password usage:<\/span><\/p>\n<ul>\n<li class=\"p4\"><span class=\"s1\">50% of IT professionals and 39% of individual users reused passwords across workplace accounts. If a hacker gets their hands on one password, it simultaneously puts multiple accounts at risk of data breaches and cybercriminal intrusions. <\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Equally concerning is that only 40% of IT professionals use MFA.<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">One final mind-blowing finding: 35% of IT Security pros did not change how they manage their passwords even after experiencing an account takeover or hacking. <\/span><\/li>\n<\/ul>\n<h2 class=\"p7\"><span class=\"s1\">How often do small businesses perform staff security training?<\/span><\/h2>\n<p class=\"p7\"><span class=\"s1\">Many SMBs (up to 100 employees) and SMEs (those with 100 to 1000 employees) don\u2019t realize how easy it is to find credentials on the <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-the-dark-web\"  data-wpil-monitor-id=\"35\">Dark Web<\/a> and exploit them. As user access provides the way that company systems and resources are accessed, attackers tirelessly try to compromise those accounts by making use of the 24 million credentials for sale on the Dark Web in 2022, according to <a href=\"https:\/\/resources.digitalshadows.com\/whitepapers-and-reports\/account-takeover-in-2022\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Account Takeover in 2022 report<\/span><\/a> by the Photon Research Team. <\/span><\/p>\n<p class=\"p7\"><span class=\"s1\">According to an article in <a href=\"https:\/\/www.privacyaffairs.com\/dark-web-price-index-2022\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Privacy Affairs magazine<\/span><\/a>, login credentials for banks or financial systems sell for between $15 and $1000 on the Dark Web if compromised, credit card details with CVV start at $15 while social media login credentials start at $1.<\/span><\/p>\n<p class=\"p7\"><span class=\"s1\">SMBs and SMEs do not appear to have what they need to prevent attacks, lacking internal resources, cybersecurity plans and budgets. According to KnowBe4, <a href=\"https:\/\/blog.knowbe4.com\/businesses-lack-cyber-attack-defense\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">40% do not conduct regular training<\/span><\/a><\/span><span class=\"s10\">, 16% only perform ad hoc training, and 9% only push training when an incident occurs.<\/span><span class=\"s1\"> <\/span><\/p>\n<h2 class=\"p7\"><span class=\"s1\">The Human Factor in Security Breaches<\/span><\/h2>\n<p class=\"p7\"><span class=\"s1\">If a privileged user makes a mistake or an attacker gets access to a privileged account, the most valuable data is at risk. Insider threats are defined as attacks where legitimate users leverage that access, either maliciously or accidentally, and ultimately cause harm to the organization. This type of threat can come from a current or former disgruntled employee, or from a third-party contractor or vendor who used a co-shared account and its access has never been removed. <\/span><\/p>\n<p class=\"p7\"><span class=\"s1\">According to the <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/YNAPDA6B\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">2021 IBM Security X-Force Insider Threat Report<\/span><\/a>, 40% of security incidents involved an employee with privileged access to company assets.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">Manual and browser-based password management methods increase risk<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">According to recent stats, SMB and SME employees have an average of 100 passwords. Let\u2019s be honest, this seems like a lot to manage. So how are people managing these? You have a number of different options:<\/span><\/p>\n<ul>\n<li class=\"p4\"><span class=\"s1\"><strong>Memorization:<\/strong> Some employees may rely on their memory, which involves remembering complex passwords for multiple accounts. However, this can be difficult and time-consuming, especially when employees have to change their passwords frequently.<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\"><strong>Writing down passwords:<\/strong> Some employees may write down their passwords on a piece of paper or in a notebook, which can be a security risk if the book is lost or stolen. It can also be difficult to manage and organize a large number of passwords this way.<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\"><strong>Saving passwords in browsers:<\/strong> Some employees may choose to save their passwords in their web browsers, which can be convenient but also a security risk. Browser-based password managers are vulnerable to browser-based attacks, such as malicious browser extensions or cross-site scripting (XSS) attacks, which can allow attackers to steal stored passwords.<\/span><span class=\"s11\"> <\/span><span class=\"s1\">If the browser is compromised, the saved passwords can be easily accessed by hackers.<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\"><strong>Using a password manager:<\/strong> Many employees are turning to password manager solutions to manage their passwords. These tools store passwords securely and can generate strong, unique passwords for each account. This can eliminate the need for employees to remember multiple passwords and can improve overall security.<\/span><\/li>\n<\/ul>\n<h2 class=\"p1\"><span class=\"s1\">Using a password management solution increases both security and efficiency<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">There are several reasons why enterprises need to use a <a href=\"https:\/\/www.n-able.com\/products\/passportal\/password-manager\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">password manager solution<\/span><\/a>:<\/span><\/p>\n<ol>\n<li class=\"p4\"><span class=\"s1\">Improved security: Password manager solutions help enterprises improve their security posture by enabling users to create strong, unique passwords for each account. This eliminates the need for users to remember multiple passwords and reduces the risk of weak passwords or reused passwords being used, both of which can be easily compromised.<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Centralized management: Password manager solutions enable enterprises to manage passwords centrally, ensuring that password policies are enforced across the organization. This can help to reduce the risk of data breaches caused by weak or compromised passwords. Moreover, this allows the IT manager to give end users a secure place to centralize corporate and personal credentials, and set up folders to organize them, not leaving anything exposed.<\/span><\/li>\n<li class=\"p6\"><span class=\"s1\">Credential discovery and automation: This helps to automatically discover new Active Directory accounts and password changes, implement password rotation and role-based access. It also empowers the IT manager to remove access when deemed necessary and prevent unauthorized logins.<\/span><\/li>\n<\/ol>\n<p class=\"p7\"><span class=\"s1\">Cyber insurance providers typically evaluate an organization&#8217;s overall cyber risk posture when determining the premium and coverage offered. Using a password manager can be a positive factor in this evaluation as it demonstrates that the organization is taking steps to mitigate the risk of password-related attacks. This coupled with employee education and training on the risks associated with poor password management can help enterprises to improve their security posture, and ensure compliance with regulatory requirements as well as requirements for insurance coverage.<\/span><\/p>\n<p class=\"p7\"><strong><span class=\"s8\"><a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">N&#8209;able Passportal<\/a><\/span><span class=\"s1\"> helps IT teams prevent and avoid network security threats. It does this by securely storing and managing credentials for online and offline applications and safely sharing login credentials. Additionally, <a href=\"https:\/\/www.n-able.com\/products\/passportal\/password-management-as-a-service\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Passportal Site<\/span><\/a> add-on provides end-users the ability to efficiently manage their own passwords.<\/span><\/strong><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p7\"><em><span class=\"s1\">Marilena Levy is Senior Product Marketing Manager at N&#8209;able<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is it time to review your cybersecurity practices and privileged access strategies? Marilena Levy looks at some of the worrying trends.<\/p>\n","protected":false},"author":33,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-45088","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Password Managers Help Meet Cybersecurity Requirements - N-able<\/title>\n<meta name=\"description\" content=\"Is it time to review your cybersecurity practices and privileged access strategies? This blog takes a look at some of the worrying trends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Password Managers Help Meet Cybersecurity Requirements - N-able\" \/>\n<meta property=\"og:description\" content=\"Is it time to review your cybersecurity practices and privileged access strategies? This blog takes a look at some of the worrying trends.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-04T08:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T13:06:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/04\/230418_blogbanner_WorldPasswordDay_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marilena Levy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/04\/230418_blogbanner_WorldPasswordDay_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marilena Levy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements\"},\"author\":{\"name\":\"Marilena Levy\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e5bb99739c95542324b6df808016900f\"},\"headline\":\"How Password Managers Help Meet Cybersecurity Requirements\",\"datePublished\":\"2023-05-04T09:00:28+01:00\",\"dateModified\":\"2025-05-23T13:06:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements\"},\"wordCount\":1143,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements\",\"name\":\"How Password Managers Help Meet Cybersecurity Requirements - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2023-05-04T09:00:28+01:00\",\"dateModified\":\"2025-05-23T13:06:40+00:00\",\"description\":\"Is it time to review your cybersecurity practices and privileged access strategies? This blog takes a look at some of the worrying trends.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Password Managers Help Meet Cybersecurity Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e5bb99739c95542324b6df808016900f\",\"name\":\"Marilena Levy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/90cda488bb5d5e472432bac98e6c8ac40fae099fcdbd36299ce8c1ce723f64a8?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/90cda488bb5d5e472432bac98e6c8ac40fae099fcdbd36299ce8c1ce723f64a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/90cda488bb5d5e472432bac98e6c8ac40fae099fcdbd36299ce8c1ce723f64a8?s=96&d=mm&r=g\",\"caption\":\"Marilena Levy\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Password Managers Help Meet Cybersecurity Requirements - N-able","description":"Is it time to review your cybersecurity practices and privileged access strategies? This blog takes a look at some of the worrying trends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements","og_locale":"it_IT","og_type":"article","og_title":"How Password Managers Help Meet Cybersecurity Requirements - N-able","og_description":"Is it time to review your cybersecurity practices and privileged access strategies? This blog takes a look at some of the worrying trends.","og_url":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-05-04T08:00:28+00:00","article_modified_time":"2025-05-23T13:06:40+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/04\/230418_blogbanner_WorldPasswordDay_ss.jpg","type":"image\/jpeg"}],"author":"Marilena Levy","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/04\/230418_blogbanner_WorldPasswordDay_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Marilena Levy","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements"},"author":{"name":"Marilena Levy","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e5bb99739c95542324b6df808016900f"},"headline":"How Password Managers Help Meet Cybersecurity Requirements","datePublished":"2023-05-04T09:00:28+01:00","dateModified":"2025-05-23T13:06:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements"},"wordCount":1143,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements","url":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements","name":"How Password Managers Help Meet Cybersecurity Requirements - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2023-05-04T09:00:28+01:00","dateModified":"2025-05-23T13:06:40+00:00","description":"Is it time to review your cybersecurity practices and privileged access strategies? This blog takes a look at some of the worrying trends.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/how-password-managers-help-meet-cybersecurity-requirements#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"How Password Managers Help Meet Cybersecurity Requirements"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/e5bb99739c95542324b6df808016900f","name":"Marilena Levy","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/90cda488bb5d5e472432bac98e6c8ac40fae099fcdbd36299ce8c1ce723f64a8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/90cda488bb5d5e472432bac98e6c8ac40fae099fcdbd36299ce8c1ce723f64a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90cda488bb5d5e472432bac98e6c8ac40fae099fcdbd36299ce8c1ce723f64a8?s=96&d=mm&r=g","caption":"Marilena Levy"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/45088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=45088"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/45088\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=45088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}