"Lean forwards Eddie" - What’s that Wi-Fi password?

Blunders can happen at any time

Blunders can happen at any time - and one did in the recent Australia versus England rugby match, when the camera cut to England head coach Eddie Jones with the Wi-Fi password on a whiteboard behind him! 

The trick is to always assume the worst – and plan your cyber security strategy accordingly.

Password protection is an essential ingredient of every credible cyber security strategy, ensuring that staff, customers and critical company data are all protected.

If malicious actors access a business Wi-Fi network, any devices with weak passwords connected that network are primed for a hacking attempt. If a password is easy for a criminal to guess, this makes it all the more likely they will gain access.

What’s the solution?

Enforcing strong password management is vital to ensure users don’t get caught in the trap of using “easy” passwords. The reason for this? If a password is easy for a user to remember, then it will also be easier for sophisticated cybercriminals to guess too.

With strong password controls, organisations can provide a strong first line of defence against cyber attacks, while ensuring only those users with the appropriate privileges can access certain information.

Password protection best practices

Passwords don’t just stop at logging into devices. After all, a PC with “Password123” wouldn’t take long for any hacker to crack.

Implementing passwords to gain entry to corporate networks, core business software and collaboration tools is essential to authenticate the user trying to use these tools.

A good password protection strategy includes guidance on creating passwords, how to store them safely, and changing them at regular intervals.

Find out more about password management in your organisation
Technology Spotlight
Reseller Spotlight
Related Stories
How passwords can be vulnerabilities
How passwords can be vulnerabilities

Clamp down on password reuse, weak passwords and other questionable behaviors.

Combatting social engineering in 2024
Combatting social engineering in 2024

The journey from adaptation to elimination

Lessons from the British Library cyber attack
Lessons from the British Library cyber attack

On-demand webinar: Protecting your data - insights from a professional hacker.

The Psychology of Passwords
The Psychology of Passwords

Understanding and outsmarting password (mis)behaviours

Effortless Password Management
eBook: The 3rd Annual Global Password Security Report
eBook: The 3rd Annual Global Password Security Report

Emerging trends in access and authentication in businesses

Identity 101 for SMBs
Identity 101 for SMBs

Guide to benefits and features of identity solutions

Share this story

Rate the Article

Click the link below to rate this article

Rate this article
Have you seen...

Get all of the Azure migration tools and guidance you need to plan and implement your move to the cloud – and track your progress using a central dashboard that provides intelligent insights.

Watch Video
Related Articles