Password Management Strategies for Safe Systems: Offense and Defense


Editor's note: This is a Web-exclusive exhibit for "Password Management Strategies for Safer Systems."

Primary Security Risks Effective Countermeasures
Failing to enhance password security in order to focus on searching for a “perfect” security system and obtaining more funding.
  • Immediately improve password security procedures.
Implementing new system security procedures or a new security system without adequate planning and full knowledge of current system’s capabilities.
  • Learn how current system stores and protects passwords.
  • Observe employees' password-related practices (for example, check for notes near monitors).
  • Identify security system capabilities necessary to ensure employees' adherence to password security requirements.
  • Perform a thorough needs analysis before buying new security software.
Inconsistently enforcing safe password practices.
  • Obtain high-visibility, senior management support of safe password practices, and publicize them to all employees.
  • Enforce all safe password practices without exception.
  • Make adherence to safe password practices a condition of employment.

Also read these other Web-exclusive exhibits:
Safe Password Practices
Glossary of Key Terms


Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.


News quiz: Retirement planning, tax practice, and fraud risk

Recent reports focused on a survey that gauges the worries about retirement among CPA financial planners’ clients, a suit that affects tax practitioners, and a guide that offers advice on fraud risk. See how much you know with this short quiz.


Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.