People use the “password on a sticky note” as an example of weak security practices so often that the image has become almost a parody of itself. But experts say such blatant disregard for company security is not unusual. Written passwords stored next to a computer is one of the most common ways outsiders gain access to a company’s information, according to Razorpoint Security Technologies President Gary Morse. In addition, users are often quick to share IDs and passwords to allow others access into their files. “It’s a poor practice, and it happens in almost every business unit I’ve ever seen,” says Stacy Bresler, senior information security principal at Pacificorp, a subsidiary of ScottishPower. Thomas Luce, an independent security consultant, recalls a security audit he performed for a doctor’s office in which the whole office shared a simple user name and password that a third-grader could have guessed. According to Morse, any word that appears in a dictionary is easy fodder for a hacker with the right computer program; programs can run through colossal lists of words in mere seconds. To guard against such attacks, he suggests that CSOs share these tips with users: 1. Take a common word and substitute one letter with a number or symbol. Or alternate consonants with vowels to create a wordlike cacamathat isn’t in the dictionary. 2. Create a password you will remember without writing it down. 3. If you have to share your password for any reason, change it immediately. 4. Understand the particularities of the system your company usessome programs are case-sensitive, but others are not. For those that are, consider alternating uppercase and lowercase letters. 5. Never use personal information that can be guessed easily: your or your spouse’s name, your children’s names, your birthday. 6. Never use the word password. (Don’t laugh. People do it all the time.) Related content brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe