{"id":3526,"date":"2023-10-10T12:44:37","date_gmt":"2023-10-10T16:44:37","guid":{"rendered":"http:\/\/www.jumpcloud.com\/blog\/?p=3526"},"modified":"2024-11-14T19:31:11","modified_gmt":"2024-11-15T00:31:11","slug":"it-password-security","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/it-password-security","title":{"rendered":"Best Practices for IT Password Security"},"content":{"rendered":"\n<p><em>October is Cybersecurity Awareness Month, and the U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) organization is calling on all of us to \u201cSecure Our World,\u201d with a simple message that calls everyone to action \u201cto adopt ongoing cybersecurity habits and improved online safety behaviors.\u201d This month, the JumpCloud blog will focus on helping you empower everyone in your organization to do their part regarding cybersecurity. Tune in throughout the month for more cybersecurity content written specifically for IT professionals.<\/em><\/p>\n\n\n\n<hr>\n\n\n\n<p>It\u2019s safe to say: IT has a password problem.<\/p>\n\n\n\n<p>Gartner <a href=\"http:\/\/www.gartner.com\/technology\/home.jsp\" target=\"_blank\" rel=\"noreferrer noopener\">reports<\/a> that as much as 50% of help desk calls are just password resets. Meanwhile, insecure passwords are leading to more <a href=\"https:\/\/www.forbes.com\/sites\/moneybuilder\/2015\/01\/13\/the-big-data-breaches-of-2014\/\" target=\"_blank\" rel=\"noreferrer noopener\">high-profile breaches<\/a> than ever before. Password protection and management is something that we\u2019re highly in tune with here at JumpCloud, where security via our <a href=\"https:\/\/jumpcloud.com\/platform\" target=\"_blank\" rel=\"noreferrer noopener\">cloud directory platform<\/a> is our bread and butter. And thankfully, there are some amazing tools out there today that can make password management much easier and more secure.<\/p>\n\n\n\n<p>Password management has a few components. The first step is contextualizing the breadth and depth of the problem. Then, it\u2019s all about implementing password protection best practices to secure your organizational resources without interfering with your employees\u2019 user experience. In this article, we\u2019ll walk through common password mistakes, the best practices to combat them, and how to simplify your management complexity.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Password Mistakes&nbsp;<\/h2>\n\n\n\n<p>Simply put, cybercriminals have evolved to be smarter about how they acquire user credentials, but our business environments have not evolved to properly defend against them. According to Specops\u2019s <a href=\"https:\/\/specopssoft.com\/wp-content\/uploads\/2023\/06\/Specops-Software-Weak-Pwd-report-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2023 Weak Passwords Report<\/a>, 41% of Americans rely on memory alone to<\/p>\n\n\n\n<p>track their passwords. And, you can\u2019t leave it up to users to secure their own credentials. Most employees reuse passwords for work and home, and make their passwords deliberately easy to remember \u2013 which also means they\u2019re easy to guess.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Using Common Passwords&nbsp;<\/h3>\n\n\n\n<p>Common password credentials are often the first ones bad actors attempt during brute force attacks. They\u2019ll find these password lists on breached password dumps, and systematically enter them until one works.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/cybernews.com\/best-password-managers\/most-common-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to Cybernews<\/a>, the 10 most common passwords leaked in 2023 were:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>123456<\/li>\n\n\n\n<li>123456789<\/li>\n\n\n\n<li>qwerty<\/li>\n\n\n\n<li>password<\/li>\n\n\n\n<li>12345<\/li>\n\n\n\n<li>qwerty123<\/li>\n\n\n\n<li>1q2w3e<\/li>\n\n\n\n<li>12345678<\/li>\n\n\n\n<li>111111<\/li>\n\n\n\n<li>1234567890<\/li>\n<\/ol>\n\n\n\n<p>These passwords are not only easy to guess; most of them are also very short, and have very little complexity, with no special characters. Many of them don\u2019t even have a mix of both letters and numbers, and none of them are personalized to the user.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Using Overly Simple Passwords&nbsp;<\/h3>\n\n\n\n<p>You can\u2019t just opt for a password that isn\u2019t lazy and obvious. You must also add layers of complexity with a combination of long-chain letters, numbers, and special characters. It may feel like common knowledge that using over eight characters in a password was enough to deter most cybercriminals, but this isn\u2019t always put into practice. In fact, <a href=\"https:\/\/specopssoft.com\/wp-content\/uploads\/2023\/06\/Specops-Software-Weak-Pwd-report-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">88%<\/a> of brute force password attacks in 2023 used passwords with 12 characters or less, and nearly a quarter of those attacks used passwords with only 8 characters.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reusing Passwords on Multiple Applications&nbsp;<\/h3>\n\n\n\n<p>Without a <a href=\"https:\/\/jumpcloud.com\/platform\/password-manager\" target=\"_blank\" rel=\"noreferrer noopener\">password manager<\/a> to securely store login credentials, many users resort to reusing passwords, simply so they can remember them.&nbsp; According to Google\u2019s <a href=\"https:\/\/services.google.com\/fh\/files\/blogs\/google_security_infographic.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Online Security Survey<\/a>, 52% of users reuse the same passwords for multiple accounts, and 13% use the same password for <em>all<\/em> their accounts.&nbsp;<\/p>\n\n\n\n<p>Using the same password repeatedly significantly widens the attack surface. A compromise of just one resource \u2013 even something as innocuous as a social media or retail account login \u2013 can lead to compromise of company resources, too.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Password Management Best Practices&nbsp;<\/h2>\n\n\n\n<p>Password management issues may be widespread, but that doesn\u2019t mean your organization is destined to become the next victim of a cyber attack. Next, we\u2019ll give you a few best practices to implement in order to better secure your users\u2019 passwords.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Create a Password Policy \u2013 and Enforce It.<\/h3>\n\n\n\n<p>Design a detailed password policy all employees and user identities must follow to gain access to company resources. A modern cloud directory platform like JumpCloud makes this easy by creating password requirement policies based on your specifications. Here\u2019s some examples of what should be included in your policy.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Length\/Complexity Requirements&nbsp;<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Specify a required length: <\/strong>In the world of passwords, size <em>does<\/em> count. Eight characters is no longer enough, and based on Specops\u2019 resource, 12 characters are quickly becoming too simplified as well. We recommend 18+ characters in a password.&nbsp;<\/li>\n\n\n\n<li><strong>Require a range of characters: <\/strong>Make each password require a mix of lowercase, uppercase, numbers, and special characters.&nbsp;<\/li>\n\n\n\n<li><strong>Don\u2019t allow words: <\/strong>It\u2019s a lot easier to guess a password if it includes your name, your kid\u2019s name, your pet\u2019s name, or a common phrase. Eliminate this risk by allowing no recognizable words in your passwords. Instead, encourage employees to create acronym strings to make passwords that are hard to crack, but easy to remember. For example, if you want to use the song lyrics, \u201cFor those about to rock, we salute you,\u201d make it part of your password by using \u201cftatrwsy\u201d. If you can add in a phrase with numbers, that could be \u201ctoo good to be true\u201d (2g2bt).<\/li>\n\n\n\n<li><strong>Don\u2019t allow reuse: <\/strong>Ensure your password setting system can identify if a password has been used previously on the site, and do not allow employees to reuse these old credentials.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Require Passwords Across Devices and Applications<\/h4>\n\n\n\n<p>Regardless of whether it\u2019s a company laptop, an employee\u2019s email on a personal device, an iPad, or even a BYOD cell phone, if a device is configured to connect to company resources, it must be protected with a complex password.&nbsp;<\/p>\n\n\n\n<p>Some organizations still have their heads in the sand about the breadth of password requirements. They allow <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-byod\">BYOD<\/a> without creating a policy around it or gaining control of the devices. Don\u2019t neglect the need for passwords on networks, routers, mobile devices, and for all apps in use. You don\u2019t want the next lost cell phone to lead to the next big breach.<\/p>\n\n\n\n<p>Note: check out our guide to <a href=\"https:\/\/jumpcloud.com\/blog\/how-to-create-a-byod-policy\">creating an effective BYOD policy<\/a> in your organization.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Do Not Use the Same Password for Multiple Accounts<\/h4>\n\n\n\n<p>What happens when a CEO uses the same password for accessing a confidential business network that they use for their social media pages? Just ask the 6.5 million users who were <a href=\"https:\/\/en.wikipedia.org\/wiki\/2012_LinkedIn_hack\" target=\"_blank\" rel=\"noreferrer noopener\">hacked on LinkedIn<\/a>. It\u2019s \u201cnever going to happen to you\u201d\u2026 until it does. Be smart and don\u2019t ever mix business and personal credentials. <a href=\"https:\/\/jumpcloud.com\/blog\/password-reuse-and-rotation\/\">Automatic password rotation<\/a> can enforce this company-wide.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Implement Regular Password Rotation<\/h4>\n\n\n\n<p>Use a <a href=\"https:\/\/jumpcloud.com\/blog\/password-management-3\/\">password manager<\/a> to require the regular changing of passwords. Required <a href=\"https:\/\/jumpcloud.com\/blog\/password-reuse-and-rotation\/\">password rotation<\/a> is essential to staying one step ahead of potential hackers.<\/p>\n\n\n\n<p>Some systems require rotation but then allow a user to just switch back and forth between two passwords. Ultimately, this subverts the goal of password rotation. JumpCloud\u2019s platform catches this issue and allows admins to eliminate previous passwords as an option. This allows IT to set a number of previous passwords back that a user cannot use when rotating.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Require Multi-factor Authentication<\/h4>\n\n\n\n<p>Starting to get the sense that a passphrase alone isn\u2019t enough to secure your network and resources? You\u2019re right. In today\u2019s day and age, even the most complex passwords aren\u2019t foolproof.&nbsp;<\/p>\n\n\n\n<p>For the utmost in security, pair your detailed password policies with <a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a>. MFA combines something a user <em>knows<\/em> (typically, the traditional username and password) with something they <em>have <\/em>(like a biometric verification, or a push notification or key sent to a private phone). When paired with a strong password, MFA makes it much, much more difficult for the wrong person to access your business resources.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Educate Your Staff on Social Engineering and \u201cPhishing\u201d Attacks<\/h3>\n\n\n\n<p>Your staff is much more likely to comply with your company policies if they understand why they\u2019re necessary. Once you\u2019ve shared the policy, you must reinforce the rules by providing context around why it\u2019s so important.&nbsp;<\/p>\n\n\n\n<p>Give your tema training on the most common forms of cyber attack, like <a href=\"https:\/\/jumpcloud.com\/blog\/how-hackers-steal\">social engineering<\/a> and <a href=\"https:\/\/jumpcloud.com\/blog\/phishing-attack-statistics\">phishing<\/a>. These hacking methods are cleverly disguised and require the victim to be a willing participant in undoing their security.&nbsp;<\/p>\n\n\n\n<p>The basic rule is this: whenever you follow a link that asks for login credentials (or any other personal information for that matter) you must be highly vigilant. If you\u2019re not certain if the request for information is legitimate, then you can type the site\u2019s known URL into your browser to make sure you\u2019re not on a carefully disguised imposter\u2019s site.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reducing Password Policy Complexity&nbsp;<\/h2>\n\n\n\n<p>Are you feeling overwhelmed at this point, wondering how you\u2019re supposed to manage so many password requirements and changes for so many users? Fear not. Our modern cloud security solutions offer lots of opportunities to automate these processes, freeing your IT admins up for more complex tasks.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use a Password Manager<\/h3>\n\n\n\n<p>Weak, shared, or compromised passwords play a role in most data breaches. When end users can create and store complex passwords easily, they play an active role in protecting your organization from malicious actors. <a href=\"https:\/\/jumpcloud.com\/platform\/password-manager\" target=\"_blank\" rel=\"noreferrer noopener\">Password managers<\/a> allow users to create truly complex, uncrackable passwords while reducing downtime from not remembering them. It\u2019s the perfect solution.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Implement SSO and MFA&nbsp;<\/h3>\n\n\n\n<p>Modern cloud solutions allow you to easily implement single sign-on and multi-factor authentication models to verify users prior to letting them access company resources.&nbsp;<\/p>\n\n\n\n<p>Single sign-on enables users to log in once to access all of their IT resources; they don\u2019t have to type their username and password in over and over, or use multiple, distinct username and password pairs, to get access to everything they need to be successful at work. Today, SSO is often implemented as part of a larger identity access management (IAM) solution, such as a directory service, rather than as a separate add-on, which gives IT admins more control and visibility into what users have access to. SSO solutions that fit into this mold provide users with access to virtually all of their IT resources (networks, devices, apps, file servers, and more) through a single login.<\/p>\n\n\n\n<p>Multi-factor authentication can also be turned on with the click of a button when using solutions like JumpCloud. You can create conditional access policies that make users use a second factor to verify their identities all of the time, or only when logging in from an untrusted device, for example. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/20\/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">According to Microsoft<\/a>, enabling MFA will stop 99.9% of cyber attacks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Upgrade to a Cloud Directory Platform like JumpCloud&nbsp;<\/h2>\n\n\n\n<p>While password managers, SSO, and MFA can certainly all be purchased piecemeal, by far the easiest and most comprehensive solution is to centralize your IT management around a cloud directory platform like <a href=\"https:\/\/jumpcloud.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">JumpCloud<\/a>. JumpCloud provides a seamless single pane of glass from which to manage all user passwords and identities, and quickly batch implement the newest security policies. JumpCloud offers <a href=\"https:\/\/jumpcloud.com\/platform\/password-manager\" target=\"_blank\" rel=\"noreferrer noopener\">password management<\/a>, all-application <a href=\"https:\/\/jumpcloud.com\/platform\/single-sign-on\" target=\"_blank\" rel=\"noreferrer noopener\">SSO<\/a>, <a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">MFA capabilities<\/a> \u2013 and so much more.&nbsp;<\/p>\n\n\n\n<p>If you\u2019re ready to give a best-in-class open directory platform a try for all your IDaaS needs, JumpCloud\u2019s your solution. <a href=\"https:\/\/console.jumpcloud.com\/signup\" target=\"_blank\" rel=\"noreferrer noopener\">Start your free trial today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn password best practices to ensure that your organization\u2019s users\u2019 credentials provide the lowest possible risk of compromise by bad actors. <\/p>\n","protected":false},"author":120,"featured_media":78707,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[],"collection":[2775],"platform":[],"funnel_stage":[3016],"coauthors":[2537],"class_list":["post-3526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","collection-security","funnel_stage-top-funnel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best Practices for IT Password Security - JumpCloud<\/title>\n<meta name=\"description\" content=\"Learn password best practices to ensure that your organization\u2019s users\u2019 credentials provide the lowest possible risk of compromise by bad actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/it-password-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Practices for IT Password Security\" \/>\n<meta property=\"og:description\" content=\"Learn password best practices to ensure that your organization\u2019s users\u2019 credentials provide the lowest possible risk of compromise by bad actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/it-password-security\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T16:44:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-15T00:31:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sean Blanton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Blanton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security\"},\"author\":{\"name\":\"Sean Blanton\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/0c2a749d55fd9ade81d9f810c8d5aaa3\"},\"headline\":\"Best Practices for IT Password Security\",\"datePublished\":\"2023-10-10T16:44:37+00:00\",\"dateModified\":\"2024-11-15T00:31:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security\"},\"wordCount\":1886,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg\",\"articleSection\":[\"Best Practices\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security\",\"url\":\"https:\/\/jumpcloud.com\/blog\/it-password-security\",\"name\":\"Best Practices for IT Password Security - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg\",\"datePublished\":\"2023-10-10T16:44:37+00:00\",\"dateModified\":\"2024-11-15T00:31:11+00:00\",\"description\":\"Learn password best practices to ensure that your organization\u2019s users\u2019 credentials provide the lowest possible risk of compromise by bad actors.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/it-password-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg\",\"width\":512,\"height\":342,\"caption\":\"Easy Password concept. My password 123456 written on a paper with marker.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-password-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best Practices for IT Password Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/0c2a749d55fd9ade81d9f810c8d5aaa3\",\"name\":\"Sean Blanton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/cb916389b92a125d9ab6de7f0203b6d5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe07dbb884e78b3630de3215477666393f24a038a8ca1dbf030711423f080ad5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe07dbb884e78b3630de3215477666393f24a038a8ca1dbf030711423f080ad5?s=96&d=mm&r=g\",\"caption\":\"Sean Blanton\"},\"description\":\"Sean Blanton has spent the past 15 years in the wide world of security, networking, and IT and Infosec administration. When not at work Sean enjoys spending time with his young kids and geeking out on table top games.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Practices for IT Password Security - JumpCloud","description":"Learn password best practices to ensure that your organization\u2019s users\u2019 credentials provide the lowest possible risk of compromise by bad actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/it-password-security","og_locale":"en_US","og_type":"article","og_title":"Best Practices for IT Password Security","og_description":"Learn password best practices to ensure that your organization\u2019s users\u2019 credentials provide the lowest possible risk of compromise by bad actors.","og_url":"https:\/\/jumpcloud.com\/blog\/it-password-security","og_site_name":"JumpCloud","article_published_time":"2023-10-10T16:44:37+00:00","article_modified_time":"2024-11-15T00:31:11+00:00","og_image":[{"width":512,"height":342,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg","type":"image\/jpeg"}],"author":"Sean Blanton","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sean Blanton","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/it-password-security#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/it-password-security"},"author":{"name":"Sean Blanton","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/0c2a749d55fd9ade81d9f810c8d5aaa3"},"headline":"Best Practices for IT Password Security","datePublished":"2023-10-10T16:44:37+00:00","dateModified":"2024-11-15T00:31:11+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/it-password-security"},"wordCount":1886,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg","articleSection":["Best Practices"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/it-password-security","url":"https:\/\/jumpcloud.com\/blog\/it-password-security","name":"Best Practices for IT Password Security - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg","datePublished":"2023-10-10T16:44:37+00:00","dateModified":"2024-11-15T00:31:11+00:00","description":"Learn password best practices to ensure that your organization\u2019s users\u2019 credentials provide the lowest possible risk of compromise by bad actors.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/it-password-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/it-password-security"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/it-password-security#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/10\/password.jpeg","width":512,"height":342,"caption":"Easy Password concept. My password 123456 written on a paper with marker."},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/it-password-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Best Practices for IT Password Security"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/0c2a749d55fd9ade81d9f810c8d5aaa3","name":"Sean Blanton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/cb916389b92a125d9ab6de7f0203b6d5","url":"https:\/\/secure.gravatar.com\/avatar\/fe07dbb884e78b3630de3215477666393f24a038a8ca1dbf030711423f080ad5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe07dbb884e78b3630de3215477666393f24a038a8ca1dbf030711423f080ad5?s=96&d=mm&r=g","caption":"Sean Blanton"},"description":"Sean Blanton has spent the past 15 years in the wide world of security, networking, and IT and Infosec administration. When not at work Sean enjoys spending time with his young kids and geeking out on table top games."}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=3526"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3526\/revisions"}],"predecessor-version":[{"id":117605,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3526\/revisions\/117605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/78707"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=3526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=3526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=3526"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=3526"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=3526"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=3526"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=3526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}