{"id":6358,"date":"2017-01-03T22:02:50","date_gmt":"2017-01-03T22:02:50","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6358"},"modified":"2021-07-13T10:36:58","modified_gmt":"2021-07-13T09:36:58","slug":"msp-password-management","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management","title":{"rendered":"MSP Password Management"},"content":{"rendered":"<p>It is safe to say that both\u00a0end users\u00a0and\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/password-security-considerations-for-msps\" target=\"_blank\" rel=\"noopener\">passwords<\/a>\u00a0can bring insecurity to the enterprise. Unfortunately, even if Anne Robinson was hired as CISO, neither could be dismissed with a wink and a cheery, &#8220;you are the weakest link, goodbye!&#8221;<\/p>\n<p>Which isn&#8217;t to say that mitigating the user credential threatscape has to be difficult; quite the opposite, in fact. Truth be told, a combination of technical common sense and logical policy management can help kick much of the breach risk to the kerb.<\/p>\n<h2>Best practices for enterprise password management<\/h2>\n<p>Any enterprise security 101 book would have, written large upon the first page or two, \u201cprotect privileged accounts with complex, non-recycled passwords.\u201d That even this tenet of best practice can be overlooked with alarming regularity explains why there are so many data breaches.\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/enterprise-password-management\" target=\"_blank\" rel=\"noopener noreferrer\">Enterprise password management<\/a>\u00a0is not rocket science; in fact, you can do it in six simple steps.<\/p>\n<h2>1. Keep it complex!<\/h2>\n<p>When I say complex, what I really mean is random. And long. Personally I insist on a minimum of 16 characters, and if the system allows it\u2014some online services that should know better still have restrictions that are criminally low\u201425 characters. These need to be a mixture of upper and lower case, alphanumeric, and special characters. Which doesn&#8217;t mean taking Star Wars Return of the Jedi and turning it into \u201c!!!St@rW@rs6ReturnoftheJedi!!!\u201d because, while that is a passphrase and it is a whole heck of a lot better than a simple dictionary word, it still ain&#8217;t random.<\/p>\n<p>Use a standalone password generator tool or the function built into a password management console, to create truly random strings based upon your length and character type requirements. Don\u2019t worry too much about users remembering these complex strings: password management solutions exist to take care of that.<\/p>\n<h2>2. Change it often, but never reuse it<\/h2>\n<p>Last year the Communication Electronics Security Group (CESG), which is part of the UK Government GCHQ signals intelligence outfit, suggested in official guidance that organisations should not regularly change passwords. They reasoned that inconvenience to the user outweighed any perceived security benefit. By suggesting that complex passwords would be replaced by very similar ones so as to be more memorable, CESG grabbed the wrong end of the security stick in my opinion. What it forgot to take into account was that advances in security software mean that password managers make the act of creating, changing, and remembering passwords straightforward.<\/p>\n<p>Change your passwords on a quarterly basis (so, four times a year) and you will limit the potential damage from a breach that goes unnoticed for a long period of time. An overly draconian password change cycle with mandatory compliance is just as bad as no change cycle at all. It will get in the way of business and encourage users to look for ways to bypass it, weakening your overall security posture. So it&#8217;s important to get the balance right. It should also go without saying, but sadly doesn&#8217;t, that the same password should never be reused for more than one login.<\/p>\n<h2>3. Factor in another factor<\/h2>\n<p>The first rule of password club is never tell anyone your password\u2014obviously. However, the second rule is not to just rely upon passwords alone for protection. Password security best practices recognise the value of a layered approach; implement 2FA (two factor authentication) where possible so that there isn&#8217;t a single point of failure. By adding a token, be that in hardware or via a code-generating app, you bring something that the user has into the access equation alongside something they know.<\/p>\n<h2>4. Centralise IT<\/h2>\n<p>Managed services providers and their customers already know about the benefits of centralising IT administration. When it comes to security and password management in particular, it can be more than just cost efficient; centralising the process can improve your security posture as well. Think about it: if you have a bunch of different legacy solutions from different vendors all doing the same things but on different platforms, then you are asking for trouble. Quite apart from just how seamlessly these solutions will really work with each other, the larger your solution\u2019s footprint, the greater the opportunity for vulnerabilities to be exploited. By connecting the silos and reducing the footprint, there are fewer updates to remember and a smaller attack window for the bad guys to get through.<\/p>\n<h2>5. Destroy human error<\/h2>\n<p>This may sound aggressive, but the underlying message remains: cut out as much opportunity for human error as possible, and let the machines do what machines are best at: automating the password management process. This doesn&#8217;t mean you can, or should, remove the human gatekeeper altogether, but a solution that is policy-based and dynamic will streamline your security and leave less room for error.<\/p>\n<h2>6. Keep your policies fluid<\/h2>\n<p>Having just \u201cbigged up\u201d the bots and said that a policy-based system rules (if you&#8217;ll pardon the pun), it may sound odd to be making the case for not setting your password policy in stone. It shouldn&#8217;t. After all, since when has set-and-forget been even vaguely on the sensible password management policy scale? Your policy has to be dynamic and change with times, and that means it should be both event driven and intelligence driven.<\/p>\n<p>Don&#8217;t be afraid to update it as and when it becomes necessary. Equally, don&#8217;t be afraid to let everyone know when it has been changed and even when it has not. A policy is pointless, and toothless, if the users don&#8217;t know about it. So adopt an \u201ceducation, education, education\u201d mantra. And that means across the board, including the Board. Password policy applies to everyone, and there can be no exceptions\u2014even if you\u2019re the boss.<\/p>\n<div class=\"blog-author\">By Davey Winder<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn password management best practices and steps to avoid when managing passwords.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6358","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>MSP Password Management - N-able<\/title>\n<meta name=\"description\" content=\"Learn password management best practices and steps to avoid when managing passwords.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MSP Password Management - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn password management best practices and steps to avoid when managing passwords.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-03T22:02:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T09:36:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"MSP Password Management\",\"datePublished\":\"2017-01-03T22:02:50+00:00\",\"dateModified\":\"2021-07-13T09:36:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management\"},\"wordCount\":966,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management\",\"name\":\"MSP Password Management - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2017-01-03T22:02:50+00:00\",\"dateModified\":\"2021-07-13T09:36:58+00:00\",\"description\":\"Learn password management best practices and steps to avoid when managing passwords.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MSP Password Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"MSP Password Management - N-able","description":"Learn password management best practices and steps to avoid when managing passwords.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management","og_locale":"pt_BR","og_type":"article","og_title":"MSP Password Management - N-able","og_description":"Learn password management best practices and steps to avoid when managing passwords.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-01-03T22:02:50+00:00","article_modified_time":"2021-07-13T09:36:58+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"MSP Password Management","datePublished":"2017-01-03T22:02:50+00:00","dateModified":"2021-07-13T09:36:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management"},"wordCount":966,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["MSP Business"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management","url":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management","name":"MSP Password Management - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2017-01-03T22:02:50+00:00","dateModified":"2021-07-13T09:36:58+00:00","description":"Learn password management best practices and steps to avoid when managing passwords.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msp-password-management#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"MSP Password Management"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6358"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6358\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}