The problem with the password is not the password, it’s more the human use of passwords is flawed.
We pick simple ones, we forget complex ones, we share them with our colleagues or our boss, or anyone else that appears to have an air of authority. IS Decisions research has shown that as many as 23% of desk-based workers in the US and the UK have shared their work-related password with one or more colleagues.
But this is not the end of the world. We have a lot of work we can do with the password to make it stronger. Passwords are just a single security measure and no security measure is 100%. The idea is to do everything possible to mitigate as many risks as possible. By tackling some of these user behaviors we can make the network password stronger.
Strengthen Windows Network Password Security
Using technology solutions like UserLock, it is possible to extend the way we verify a user’s identity with additional security layers. It is possible to restrict users by location or time, stop concurrent sessions using the same login and thus reducing incentive to share passwords. You can educate your users by alerting them when their credentials are being used from a new location and closely monitor network activity in real-time for irregular access behavior.
All of these precautions reduce the ‘user error’ factor for the traditional password, and help strengthen your network.
Whilst there is no silver bullet in managing internal security, the new feature updates to UserLock 8 – released today – will make the job of managing and securing a Windows network easier, as well as help educate users and promote better security behavior. Greater control handed to administrators to monitor and restrict allows them to reduce surface area for potential attack, but things like user alerts remind users of why policies are in place and how they should be behaving on the network.
Stop blaming your users and start strengthening your Windows network password security today.
- Set enhanced controls to automatically deny/permit authenticated user access
- Stop users sharing passwords
- Protect against compromised password attacks
- Secure access to company email outside of the office
- Secure wireless networks and BYOD environments
- Assess user access risk to indicate suspicious access behavior
- Secure privileged users
- Ensure access is attributed to an individual employee
- Disseminate good user behavior to help avoid careless mistakes