{"id":2588,"date":"2021-07-21T19:50:59","date_gmt":"2021-07-21T14:20:59","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2588"},"modified":"2021-07-21T19:51:01","modified_gmt":"2021-07-21T14:21:01","slug":"five-major-credentials-security-rules-your-employees-might-ignoring","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/","title":{"rendered":"Five Major Credentials Security Rules Your Employees Might Ignoring"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">Credentials security was always a major concern even before the arrival of widespread remote work. So, what happened in the post-pandemic? Keeper Security\u2019s Workplace Password Malpractice Report wanted to find out.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In February 2021, Keeper surveyed 1,000 employees in the U.S. about their work-related passwords habits \u2013 and found that most of the remote workers are letting credentials security go by the wayside.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">&nbsp;<strong>Below are the Critical Credentials Rules they are ignoring:<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"728\" height=\"380\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Five-Major-Credentials-Security-Rules-Your-Employees-Might-Ignoring-image1.jpg\" alt=\"Five-Major-Credentials-Security-Rules-Your-Employees-Might-Ignoring-image\" class=\"wp-image-2591\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Five-Major-Credentials-Security-Rules-Your-Employees-Might-Ignoring-image1.jpg 728w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Five-Major-Credentials-Security-Rules-Your-Employees-Might-Ignoring-image1-300x157.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/figure><\/div>\n\n\n\n<ol type=\"1\"><li><strong>Always use Strong Passwords<\/strong><\/li><\/ol>\n\n\n\n<p><p style=\"text-align: justify;\">Strong passwords are at least eight characters long or more by preference and consist of random strings of letters, numerals, and special characters. Credentials should never consist of dictionary words, which are easy to predict, or personal information, which threat actors can extract off from social media channels.<\/p><\/p>\n\n\n\n<ul><li>34% of used their significant other\u2019s names or birthdays&nbsp;<\/li><li>31% have used their child\u2019s, siblings names or birthdays<\/li><li>37% of them used their employer\u2019s name as part of their work-related credentials<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\"><strong>2. Try to use a Unique Password for every account<\/strong><\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Some things should never be reused \u2013 like credentials. When employees reuse similar passwords across the accounts, they greatly increase the risk that their employers will be hijacked.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Unfortunately, around 44% of reverts from the survey are reusing the credentials across personal and work accounts.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\"><strong>3.<\/strong> <strong>Preserve all the Credentials Securely, with Full Encryption<\/strong><\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Using a unique, strong password for every account is only an initiating point. Employees also require preserving their credentials protected. According to the survey, it demonstrates that they are not paying attention to the below listed things:<\/p><\/p>\n\n\n\n<ul><li>57% of reverts write down their passwords on some sticky notes, and apart from them, around 62% write down their passwords in a notebook or journals, which anyone else living in or visiting their place can easily access.<\/li><\/ul>\n\n\n\n<ul><li>49% preserve their credentials in a document saved in the cloud, 51% utilize a document preserved locally on their systems, and the rest save them on their phone. Because these documents are not encrypted, if a threat actor hijacks the cloud drive, computer, or mobile phone, they can launch the employee\u2019s password file.<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\"><strong>4.<\/strong> <strong>Never share Work-related credentials with unauthorized parties<\/strong><\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Work credentials are confidential business data that employees should never share with anyone outside the organization, not even their spouses. The survey revealed that 25% of remote workers have shared work-related credentials with their loved ones.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\"><strong>5.<\/strong> <strong>End-to-End Encryption<\/strong><\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Share credentials at your workplace can be done safely if employees share their credentials using a secure method, and the passwords are transmitted only with authenticating parties. However, from a survey, we founded that 62% of reverts share their credentials through encrypted email or text messages, which can be intercepted in transit.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keeper helps Organizations Avoid Workplace Passwords Malpractice<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Keeper\u2019s enterprise-grade password security and encryption platform help organizations prevent credentials malpractice \u2013 and password-related Cyberattack \u2013 by giving IT administrators complete visibility into employee password practices, as well as the ability to enforce password security rule company-wide:<\/p><\/p>\n\n\n\n<ul><li>Seriously Integrates into Any IAM Tech Stack<\/li><li>Automatically Generates Strong, Unique Passwords<\/li><li>Securely Preserves Credentials in an Encrypted Digital Vault<\/li><li>Gives IT admin Complete Control Over Employee Password Behavior<\/li><li>Enable Secure Password Sharing&nbsp;<\/li><li>Provides your Employees with Fringe Advantages, at no Advanced Cost<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\">Credentials Security is the foundation of cybersecurity, and it\u2019s especially essential in a remote work world. It\u2019s impossible to protect your organizations without the first security of the employee\u2019s passwords.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Keeper set up within minutes is simple for all employees to use, and scales to the size of the organization. Sign up for a 14-day free trial of keeper now, and initiate securing your organizations from credentials malpractice.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Credentials security was always a major concern even before the arrival of widespread remote work. So, what happened in the post-pandemic? Keeper Security\u2019s Workplace Password Malpractice Report wanted to find out. In February 2021, Keeper surveyed 1,000 employees in the U.S. about their work-related passwords habits \u2013 and found that most of the remote workers [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2590,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Five Major Credentials Security Rules Your Employees Might Ignoring - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Major Credentials Security Rules Your Employees Might Ignoring - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Credentials security was always a major concern even before the arrival of widespread remote work. So, what happened in the post-pandemic? Keeper Security\u2019s Workplace Password Malpractice Report wanted to find out. In February 2021, Keeper surveyed 1,000 employees in the U.S. about their work-related passwords habits \u2013 and found that most of the remote workers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-21T14:20:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-21T14:21:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Five-Major-Credentials-Security-Rules-Your-Employees-Might-Ignoring-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Five Major Credentials Security Rules Your Employees Might Ignoring\",\"datePublished\":\"2021-07-21T14:20:59+00:00\",\"dateModified\":\"2021-07-21T14:21:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/\"},\"wordCount\":604,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Infosec News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/\",\"url\":\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/\",\"name\":\"Five Major Credentials Security Rules Your Employees Might Ignoring - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-07-21T14:20:59+00:00\",\"dateModified\":\"2021-07-21T14:21:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Major Credentials Security Rules Your Employees Might Ignoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Major Credentials Security Rules Your Employees Might Ignoring - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/","og_locale":"en_US","og_type":"article","og_title":"Five Major Credentials Security Rules Your Employees Might Ignoring - Xiarch Solutions Private Limited","og_description":"Credentials security was always a major concern even before the arrival of widespread remote work. So, what happened in the post-pandemic? Keeper Security\u2019s Workplace Password Malpractice Report wanted to find out. In February 2021, Keeper surveyed 1,000 employees in the U.S. about their work-related passwords habits \u2013 and found that most of the remote workers [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-07-21T14:20:59+00:00","article_modified_time":"2021-07-21T14:21:01+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Five-Major-Credentials-Security-Rules-Your-Employees-Might-Ignoring-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Five Major Credentials Security Rules Your Employees Might Ignoring","datePublished":"2021-07-21T14:20:59+00:00","dateModified":"2021-07-21T14:21:01+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/"},"wordCount":604,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Infosec News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/","url":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/","name":"Five Major Credentials Security Rules Your Employees Might Ignoring - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-07-21T14:20:59+00:00","dateModified":"2021-07-21T14:21:01+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/five-major-credentials-security-rules-your-employees-might-ignoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Five Major Credentials Security Rules Your Employees Might Ignoring"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2588"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2588"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2588\/revisions"}],"predecessor-version":[{"id":2592,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2588\/revisions\/2592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2590"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}