{"id":43811,"date":"2022-03-11T09:35:48","date_gmt":"2022-03-11T01:35:48","guid":{"rendered":"https:\/\/version-2.com\/?p=43811"},"modified":"2022-03-08T14:34:26","modified_gmt":"2022-03-08T06:34:26","slug":"how-to-create-a-secure-password-policy","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/03\/how-to-create-a-secure-password-policy\/","title":{"rendered":"How to Create a Secure Password Policy?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"43811\" class=\"elementor elementor-43811\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/02\/How-to-Create-a-Secure-Password-Policy.png\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n<p>Having an efficient <b>password policy<\/b> is critical to the <a href=\"\/en\/2021\/12\/cybersecurity-trends-for-2022\/\">cybersecurity<\/a> of companies. Since using easy-to-identify passwords is a way to facilitate scams by malicious actors. For the same reason, repeating passwords is a risky practice.<\/p> <p>In 2021, more than 8.4 billion passwords from people all over the world were leaked and posted under the name \u2018<i>rock you 2021<\/i>\u2018 in an online forum. What did they have in common? They used between 6 and 20 characters, without spaces, numbers, or symbols.<\/p> <p>Other characteristics of easy-to-steal passwords are: using birthday or algorithms with repeated numbers, proper names, numerical combinations, and the <a href=\"https:\/\/g1.globo.com\/tecnologia\/noticia\/2021\/11\/18\/as-senhas-mais-comuns-em-vazamentos-de-dados-no-brasil-em-2021.ghtml\">word Brazil<\/a> are also often found in leaked passwords of Brazilian users, in addition to the sequence 123456.<\/p> <p>We have prepared this article especially to help you keep your company protected. In it, we will propose positive actions for an effective <b>password policy<\/b>. They are as follows:<\/p> <ul> <li><b>Change Passwords Frequently<\/b><\/li> <\/ul> <ul> <li><b>Use Software that Alerts You About the Change<\/b><\/li> <\/ul> <ul> <li><b>Join an Account Lockout System<\/b><\/li> <\/ul> <ul> <li><b>Train Your Employees<\/b><\/li> <\/ul> <ul> <li><b>Do Not Use the Same Password for All Accounts<\/b><\/li> <\/ul> <ul> <li><b>Create Strong Passwords<\/b><\/li> <\/ul> <ul> <li><b>Have a Password Manager<\/b><\/li> <\/ul> <ul> <li><b>Adopt Multifactor Authentication in Your Company\u2019s Routine<\/b><\/li> <\/ul> <p>Read it until the end!<\/p>\n<h2><b>Why Should You Adopt a Secure Password Policy?<\/b><\/h2> <p>We know <i>hackers<\/i> take advantage of the weakness of corporate passwords in most cyber-invasions.&nbsp;<\/p> <p>Therefore, regardless of the size or industry of an organization, it is essential to have a secure <b>password policy<\/b>. After all, by adopting it, one avoids invasions that generate inconvenience and financial losses, in addition to preventing the company\u2019s credibility from coming into question.<\/p> <p>In practice, the <b>password policy <\/b>establishes rules to be followed by the entire team, ensuring the adoption of security requirements when creating passwords for accessing corporate devices and systems.<\/p> <p>In the next topic, we cover some criteria you should adopt when establishing a <b>password policy<\/b> for your business.&nbsp;<\/p> <p>&nbsp;<\/p> <h2><b>Positive Actions for an Effective Password Policy<\/b><\/h2> <p>You now understand the importance of creating a secure <b>password policy<\/b> for your company. Now, let\u2019s show you how this can be done. Keep reading our text!<\/p><ul> <li> <h3><b>Change Passwords Frequently<\/b><\/h3> <\/li> <\/ul> <p>It is believed that using the same password in different applications and services can facilitate the access of malicious users, and when we reduce the number of accesses with the same password, we also reduce the possibilities that they are shared and available for access by third parties.<\/p> <p>However, the usefulness of this measure has been questioned. Microsoft itself stopped asking for the periodic change of passwords, considering this method useless. According to this <a href=\"https:\/\/www.istoedinheiro.com.br\/microsoft-deixara-de-pedir-trocas-de-senha-periodicamente-por-ser-um-metodo-inutil\/\">report<\/a> in <b>Isto \u00c9 Dinheiro<\/b>, Aaron Margosis, a cybersecurity consultant at Microsoft, stated it is necessary to change the password only if it is stolen.<\/p> <p>Despite this debate, the periodic change of passwords has still been recommended, for this reason, we explain about software that emits alerts when it is time to change them in the following topic.<\/p><ul> <li> <h3><b>Use Software that Alerts You About the Change<\/b><\/h3> <\/li> <\/ul> <p>There is specific software that warns about the need to change passwords. They work as follows: when you try to access the computer after some time, you see a <i>pop-up<\/i>, warning you about the need to change your password to proceed. If you don\u2019t, you will not be able to access the system.<\/p> <p>These pieces of software are very useful because, over time, it is very common for people to get comfortable and fail to change their passwords within a certain time.<\/p><ul> <li> <h3><b>Join an Account Lockout System<\/b><\/h3> <\/li> <\/ul> <p>Blocking accounts is a very important practice that prevents access after a certain number of attempts. This feature prevents the user from trying to access a system by testing multiple passwords until they reach their goal. This practice is known as <i>brute force<\/i> and is often used by malicious attackers to gain unauthorized access to these systems.<\/p> <p>To get a sense of the importance this feature has, it is widely used by e-mail services and various websites.<\/p><ul> <li> <h3><b>Train Your Employees<\/b><\/h3> <\/li> <\/ul> <p>If you are at the head of an organization, you should know that in addition to investing in technology to ensure information security, you need to train your employees through awareness and training to make it possible to identify and avoid <a href=\"\/en\/2021\/11\/top-5-cyber-threats-to-healthcare-organizations\/\">threats<\/a>.<\/p> <p>Many people are unaware of the risks involved in accessing corporate systems. In these cases, it is necessary to introduce good practices and enforce them to prevent cyberattacks, including password theft.&nbsp;<\/p> <p>It is also important that these pieces of training are constant, since technology advances every day, as well as the techniques used by malicious agents.<\/p><ul> <li> <h3><b>Do Not Use the Same Password for All Accounts<\/b><\/h3> <\/li> <\/ul> <p>If someone manages to steal your password from social media, for example, it is very likely they will test it on your other services, causing much more damage if you use the same password to connect to different online platforms.<\/p> <p>Therefore, when establishing a <b>password policy<\/b>, remember to recommend that your employees have a different password for each online environment they access.<\/p><ul> <li> <h3><b>Create Strong Passwords<\/b><\/h3> <\/li> <\/ul> <p>It is not enough to use passwords to access systems. It is necessary to resort to strategies that make it possible to increase the<a href=\"\/en\/2021\/11\/the-main-effects-caused-by-the-pandemic-on-information-security\/\"> security<\/a> level of the passwords used. After all, <i>hackers<\/i> often analyze users and attempt the invasion by testing obvious possibilities such as birthdates, relatives\u2019 names, and short words.<\/p> <p>In these cases, we recommend using a minimum number of digits, combining uppercase and lowercase letters, numbers, and symbols.<\/p><ul> <li> <h3><b>Have a Password Management Solution<\/b><\/h3> <\/li> <\/ul> <p>If you follow the fifth and sixth tips in this article, your employees will have to remember a lot of complex passwords, which can be quite difficult. That\u2019s where a password management solution comes into play.<\/p> <p>This feature is capable of storing passwords, facilitating the work of users, who only need to remember the password used to access this system. What\u2019s more, password managers still suggest codes that are unlikely to be discovered.&nbsp;<\/p> <p>Of course, like all other apps, they can be breached. Therefore, it is essential to use an extremely secure master password.<\/p><ul> <li> <h3><b>Adopt Multifactor Authentication in Your Company\u2019s Routine<\/b><\/h3> <\/li> <\/ul> <p>One of the ways to create a secure <b>password policy<\/b> is to adopt <b>multifactor authentication<\/b> (MFA). This solution brings together different mechanisms to prevent intrusions, which are:<\/p> <ul> <li style=\"font-weight:400;\">Knowledge Factor: something the user knows, such as a password;<\/li> <li style=\"font-weight:400;\">Ownership Factor: something the user owns, such as a token; and<\/li> <li style=\"font-weight:400;\">Inheritance Factor: something that relates to who they are, as in the case of biometrics.<\/li> <\/ul> <p>But remember an important detail: in the multifactor authentication, the mechanisms must be independent of each other to guarantee the protection of a system. This means that if one of the factors gives access to the other, your organization is not protected.<\/p> <p>By reading this article, you learned what you should do to create an effective <b>password policy<\/b> for your organization. Did you like our text? Share it with someone else who is interested in the topic.&nbsp;<\/p> <p>&nbsp;<\/p> <p><b>ALSO READ IN SENHASEGURA\u2019S <\/b><b>BLOG<\/b><\/p> <p><a href=\"\/en\/2022\/01\/high-availability-technology-that-guarantees-productivity-and-credibility\/\">High Availability: Technology that Guarantees Productivity and Credibility<\/a><\/p> <p><a href=\"\/en\/2021\/10\/china-has-published-its-specific-law-for-the-protection-of-personal-data-what-are-the-implications\/\">China has Published Its Specific Law For the Protection of Personal Data. What Are The Implications?<\/a><\/p> <p><a href=\"\/en\/2021\/10\/my-company-suffered-a-ransomware-attack-should-i-pay-the-ransom-or-not\/\">My Company Suffered a Ransomware Attack: Should I Pay the Ransom or Not?<\/a><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Having an efficient password policy is critical to the  [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-43811","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Create a Secure Password Policy? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Create a Secure Password Policy? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Having an efficient password policy is critical to the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-11T01:35:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/02\/How-to-Create-a-Secure-Password-Policy.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/03\\\/how-to-create-a-secure-password-policy\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"How to Create a Secure Password Policy?\",\"datePublished\":\"2022-03-11T01:35:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/03\\\/how-to-create-a-secure-password-policy\\\/\"},\"wordCount\":1201,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-to-Create-a-Secure-Password-Policy.png\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/03\\\/how-to-create-a-secure-password-policy\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/\",\"name\":\"How to Create a Secure Password Policy? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-to-Create-a-Secure-Password-Policy.png\",\"datePublished\":\"2022-03-11T01:35:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-to-Create-a-Secure-Password-Policy.png\",\"contentUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-to-Create-a-Secure-Password-Policy.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-to-create-a-secure-password-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Create a Secure Password Policy?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Create a Secure Password Policy? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/","og_locale":"en_US","og_type":"article","og_title":"How to Create a Secure Password Policy? - Version 2","og_description":"Having an efficient password policy is critical to the [&hellip;]","og_url":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/","og_site_name":"Version 2","article_published_time":"2022-03-11T01:35:48+00:00","og_image":[{"url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/02\/How-to-Create-a-Secure-Password-Policy.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/03\/how-to-create-a-secure-password-policy\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"How to Create a Secure Password Policy?","datePublished":"2022-03-11T01:35:48+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/03\/how-to-create-a-secure-password-policy\/"},"wordCount":1201,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/02\/How-to-Create-a-Secure-Password-Policy.png","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/03\/how-to-create-a-secure-password-policy\/","url":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/","name":"How to Create a Secure Password Policy? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/02\/How-to-Create-a-Secure-Password-Policy.png","datePublished":"2022-03-11T01:35:48+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/#primaryimage","url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/02\/How-to-Create-a-Secure-Password-Policy.png","contentUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/02\/How-to-Create-a-Secure-Password-Policy.png"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/how-to-create-a-secure-password-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How to Create a Secure Password Policy?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-boD","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=43811"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43811\/revisions"}],"predecessor-version":[{"id":44295,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43811\/revisions\/44295"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=43811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=43811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=43811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}