(855) ER-TECH-1
healthcare managed it services
msp healthcare
(855) ER-TECH-1

Working Remotely? A Good Password Won’t Be Enough

Jul 16, 2020

If you’ve been working from home because of the coronavirus outbreak, you’ve made yourself safe from the disease, but you’ve also opened your computer system and work accounts to new vulnerabilities.


Google surveyed 3,000 consumers and found that 51% of them use the same passwords for both work and personal accounts.


With you and your employees working from home, devices are easily used for both work and personal purposes. This makes your business more vulnerable to possible breaches.

What are the risks?

Password cracking.

Do you ever see those scenes in a movie where a phone or laptop is left unattended, and then a character who wants to access it figures out the password really quick? Writers may have conveniently created these characters with weak passwords to move the plot forward.


Unfortunately, there are actually people in real life who don’t use long and complex passwords because they are hard to remember. Not to mention they have to do this to several accounts. Some of these passwords even have to be updated regularly.


People with weak passwords are an easy target for security breaches because they allow cybercriminals to easily steal passwords without having to use sophisticated applications. If an intruder manages to crack just one password, he or she potentially gains access to every account on the device.


Password-sharing among colleagues.

SurveyMonkey surveyed 1,507 adults and found that 34% (one-third) of them said that they share their passwords with their coworkers.


42% of them expressed that the reason why they share their passwords is to collaborate with their teammates easily.

Additionally, some employees write down their passwords in anything within their reach at their work station. It could be in a notebook or a sticky note, with both posing a risk of getting stolen or copied from.


With various collaboration tools such as G Suite for Business, you can prevent this from happening within your company. In G Suite, your employees can simultaneously work on projects while communicating in real time.


You can contact an authorized G Suite reseller if you’re interested in getting an optimal deal.

Password usage of disgruntled ex-employees.

We have those uncomfortable times where we have to fire employees who aren’t performing up to our standards.


Even during difficult times like the COVID-19 crisis, some of us were forced to downsize to keep the businesses afloat.


Companies always ensure that their IDs and physical devices are surrendered, but some forget about disabling ex-employees’ work-related accounts. This poses potential dangers such as selling of information to competitors or even deleting files in your database.


How can I combat these risks?

Aside from encouraging users to create unique passwords, Google also recommends them to implement multi-factor authentication (MFA). Microsoft also suggests that 99% of cyber attacks can be blocked through MFA. 


You can’t get a better endorsement of MFA’s effectiveness than from these tech giants. 


MFA simply means having an extra layer of security besides your usual password, making it harder to breach. MFA is highly effective because identity tokens used during every authentication process are always guaranteed to be unique. 


This extra nudge can go a long way to protect your business from cybercriminals waiting for a password mishap.


Cybercriminals have become more desperate and have more time in their hands. Even the most complex passwords won’t be enough. Now is the time to boost the security of your business.


Duo Security, one of the leading cybersecurity providers, offers multi-factor authentication technology. ER Tech Pros is a certified seller of Duo’s MFA technology. We assess your servers and help you determine the best solution for your business.

TALK TO OUR EXPERTS TODAY

Search Articles

data diddling
By Aprillice Alvez 15 Apr, 2024
Protect your healthcare practice from data diddling by educating your team on vulnerabilities and investing in prevention techniques like data validation.
A businessman wearing headphones uses a cloud phone system to do business communications
By Karen Larsen 29 Feb, 2024
The business world is steadily shifting to cloud communications. Our new blog post gives you a few reasons why you should, too. Read on to learn more.
A digital brain is sitting on top of a computer motherboard, symbolizing AI in cybersecurity
By Karen Larsen 14 Feb, 2024
While AI can revolutionize cybersecurity practices, it can also expand the attack surface. How do you balance the risks & benefits of AI in cybersecurity?
A man is typing on a laptop computer with an email alert on the screen
By Karen Larsen 05 Feb, 2024
Phishing is the primary way cybercriminals access our healthcare systems. Our new blog post shows you how to stop an email phishing attack in its tracks.
An employee's laptop on a desk, showing the need for cybersecurity best practices in remote work
By Karen Larsen 22 Dec, 2023
Remote work is revolutionizing the world, but if you want it to work for your business, you’ll need to step up your cybersecurity game.
Mobile phone  displaying a health app with a padlock and a shield on it
By Karen Larsen 18 Dec, 2023
As the world becomes increasingly digital, thousands of patients and providers are downloading the first mobile health app they find. Here’s why you shouldn’t.
A stethoscope placed on a remote healthcare device, showing the connection between MSP & healthcare
By Karen Larsen 30 Nov, 2023
Remote healthcare is here to stay. Do you have the IT expertise to navigate it? Find out how partnering with an MSP can transform how you deliver care.
Computer keyboard with a key specifically for cloud network security
By Karen Larsen 15 Nov, 2023
Thanks to the massive influx of cloud technology, businesses are future-proofing their operations with cloud-based security. Here’s why you should, too!
A fingerprint staying securely on a circuit board symbolizing MFA benefits and cybersecurity
By Karen Larsen 03 Nov, 2023
Multifactor authentication (MFA) prevents 99.9% of account compromise attacks. Find out how MFA protects your business and why you must implement it ASAP.
Cloud securely stores data from a microchip and utilizing powerful ransomware prevention
By Karen Larsen 23 Oct, 2023
Falling victim to a ransomware attack can ruin everything you worked so hard to build. Here’s how you can keep cybercriminals out of your cloud environments.
Show More

Healthcare & Tech Articles

data diddling
By Aprillice Alvez 15 Apr, 2024
Protect your healthcare practice from data diddling by educating your team on vulnerabilities and investing in prevention techniques like data validation.
A businessman wearing headphones uses a cloud phone system to do business communications
By Karen Larsen 29 Feb, 2024
The business world is steadily shifting to cloud communications. Our new blog post gives you a few reasons why you should, too. Read on to learn more.
A digital brain is sitting on top of a computer motherboard, symbolizing AI in cybersecurity
By Karen Larsen 14 Feb, 2024
While AI can revolutionize cybersecurity practices, it can also expand the attack surface. How do you balance the risks & benefits of AI in cybersecurity?
More Posts
Share by: