<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/tag/best-practices/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog #Best Practices</title><description>ActiSoft Technology - Blog #Best Practices</description><link>https://www.actisofttechnology.com/blogs/tag/best-practices</link><lastBuildDate>Thu, 23 Apr 2026 21:19:00 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[7 Reasons Why You Need a Password Manager]]></title><link>https://www.actisofttechnology.com/blogs/post/7-reasons-why-you-need-a-password-manager</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-528286738.jpg"/>Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways f ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__r401yj7QKqEYUGntCz9ww" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm__r401yj7QKqEYUGntCz9ww"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ks5JcH_kTYW7ZUuJNf9Nkw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_LfsyUnOcTqWJ9u88qeG7Pg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nPLNfvcTSKiLJI5yBrizjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Researchers attribute 80% of all breaches to weak passwords. These seemingly innocuous combinations—birthdays, pet names, or “12345”—become gateways for cybercriminals. They exploit lists of commonly used passwords and employ simple hacking tools to guess their way into accounts. Imagine someone getting rich by cracking passwords and draining bank accounts.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Monitoring your employees' password habits can be a daunting task without a password management solution in place. A business password manager grants organisations full control and oversight of their employees' password behaviours. The process of onboarding and offboarding employees is also streamlined. Continue reading to discover the functions of a password manager and how it can advantage your organisation.</p></div></div>
</div><div data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7r-flDN-SluoeIlZ4Hi9rQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:4pt;"><span style="color:inherit;">What Is a Business Password Manager?</span><br></p></div></h2></div>
<div data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_i7Q0f-_iJV747sjp1FXk-A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div>A business <a href="/password-manager" title="password manager" rel="">password manager</a> is a tool that enables you and your employees to track, store, share, protect, and manage all passwords. Passwords are kept in a secure, cloud-based digital vault, accessible only with a master password. This vault can also store more than passwords, including documents, identity cards, and SSH keys, thus streamlining the security of your employees' files and passwords. Additionally, a password manager facilitates the creation of strong, unique passwords for each account, securely storing them.</div></div><br><div>Password managers play a vital role in maintaining the security of your organisation and simplifying the management of your employees' passwords. They also negate the need for employees to submit help desk tickets for password resets.</div></div></div>
</div><div data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width: 1095px ; height: 365.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:723px ; height:241.00px ; } } @media (max-width: 767px) { [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"] .zpimage-container figure img { width:415px ; height:138.33px ; } } [data-element-id="elm_Pb-3aJ-O-_SsvwWztYpzHQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/password-manager" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Keeper%20Email%20Banner%201.png" width="415" height="138.33" loading="lazy" size="fit"/></picture></a></figure></div>
</div><div data-element-id="elm_2pbKfceujRzzEBVqQE6YKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2pbKfceujRzzEBVqQE6YKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Benefits of Having a Password Manager For Your Organisation</span></h2></div>
<div data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__n2rJbE1mDcGq5Zy5TapWw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Unsure of how a password manager can benefit your organisation? Consider these six advantages of deploying a business password management solution.</span><br></p></div>
</div><div data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ScPLf1cCQQNERmRtX_oJ7A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">1. Enforce Organisation Password Policies Efficiently</span></blockquote></h2></div>
<div data-element-id="elm_DfFAlHKLU_028c7sd8RgBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DfFAlHKLU_028c7sd8RgBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Centralising password management within a single platform enables organisations to standardise and implement password security policies throughout the organisation. This includes setting a minimum password length and mandating the use of Multi-Factor Authentication (MFA) for every compatible site.</div><br><div>Employing a password manager permits IT administrators to verify compliance with organisational password policies among all employees.</div></div></div>
</div><div data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_0y37pPZ90GOeZu5ZDuoFuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">2.&nbsp;</span><span style="color:inherit;">Visibility Into Password Practices</span></blockquote></h2></div>
<div data-element-id="elm_8uXirloSpijWoBC0HL6HZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8uXirloSpijWoBC0HL6HZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Without centralised password management, IT administrators lack insight into employees' password habits. This issue of visibility is increasingly critical with the rise of remote work. It will prevent your employees reusing the same password across various sites and applications. Password managers offer a centralised console that grants administrators full visibility into employees' password practices, regardless of whether they are working in the office, remotely, or using a hybrid approach. Don’t worry the IT administrators cannot see the passwords in a user’s vault.</span></p></div>
</div><div data-element-id="elm_EQAi45Nr5HB-alN0WUudaA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_EQAi45Nr5HB-alN0WUudaA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_U_uLuctunncA7OsLW5_Hmg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_U_uLuctunncA7OsLW5_Hmg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8d_UzP2Tm5Qapb7kMw0krg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">3. Securely Share Passwords&nbsp;</span></blockquote></h2></div>
<div data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_O2vNBDHVq-r7cv2PVKyYcA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In businesses, password sharing is essential and crucial for task completion, yet it's imperative that employees have a secure method to share these passwords with their team. A password manager serves this purpose effectively. It enables organisations to establish shared folders for various groups such as individual departments or project teams. Moreover, users can securely share credentials with designated individuals, with the added convenience of automatic credential transfer to the recipient's vault.</div><br><div>Furthermore, our offering of Keeper's password manager provides the option to dictate whether the recipient of shared credentials or folders has the permission to edit or merely view the shared items.</div></div></div>
</div></div><div data-element-id="elm_XPAwacO4FMzxcmRckDloMA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XPAwacO4FMzxcmRckDloMA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width: 251px ; height: 324.63px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:723px ; height:935.10px ; } } @media (max-width: 767px) { [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"] .zpimage-container figure img { width:415px ; height:536.75px ; } } [data-element-id="elm__Dq0Cntn0CB_PKeskcK2Kw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/PasswordManagementisCriticaltoYourCybersecurityStr/formperma/awFQlzTQXwg6Q22TZVFF_x9th1kmEpO1iuL5wLvAQzk" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Management%20is%20Critical%20to%20Your%20Cybersecurity%20Strategy.png" width="415" height="536.75" loading="lazy" size="fit"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gzAS_s6dV-JduZe6tDZqHQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">4. Implement Role-Based Access Control (RBAC)</span></blockquote></h2></div>
<div data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0vPWZhYpAFwoXqGvhghPXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Employees should be granted only the system access necessary for their job functions, nothing more, this is the Principle of Least Privilege. This not only aids in preventing insider attacks but also reduces organisational risk if an employee's account is compromised. Adopting a standardised password management solution allows organisations to enforce Role-Based Access Control (RBAC) and keep track of account activities for any unusual behaviour that might suggest misuse or a security breach.</span><br></p></div>
</div><div data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_f9Dq_iKcn4hApMFRzQVeyw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">5. Dark Web Monitoring</span></blockquote></h2></div>
<div data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GmjA-r7fw_wd8H4YoAZNCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Cybercriminals often target Software as a Service (SaaS) developers and other vendors, aiming to steal credentials from their clients' employees. It may take months for an organisation to detect a breach, and usually, the victims of these third-party breaches are the last to realise they've been compromised. Meanwhile, cybercriminals might have already sold the stolen login credentials on the dark web.</div><br><div>BreachWatch, a widely-used extension for Keeper's password manager included in our Enterprise offering, monitors dark web forums and alerts organisations in real-time if any employee passwords or credentials appear online. It integrates smoothly with the Keeper password management platform, allowing IT administrators to promptly enforce password resets.</div></div></div>
</div><div data-element-id="elm_WrMBI_OsWneprZyFTFbpxg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WrMBI_OsWneprZyFTFbpxg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1RAl4B1eVex1W4W0-J5G2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uuGm17GHqiTTsNXtihj0OA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width: 439px ; height: 621.04px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:723px ; height:1022.81px ; } } @media (max-width: 767px) { [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"] .zpimage-container figure img { width:415px ; height:587.09px ; } } [data-element-id="elm_uuGm17GHqiTTsNXtihj0OA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/The-Future-of-Defense-infographic-EN.png" width="415" height="587.09" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_QAhSx2I3bJXcBFSYm8_zyg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5UwlhJrgyvzfa4JbHULHHA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">6. Simplified employee onboarding and offboarding</span></blockquote></h2></div>
<div data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HG_8nStM_rCEHeBjq6aH2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The use of a uniform password manager streamlines the onboarding process for new hires, facilitating a smooth transition even when the team is partially or fully remote. IT administrators can efficiently prepare new employees for work within minutes by either manually registering each one via the admin console or enrolling multiple users simultaneously using Keeper's supported methods. New employees are welcomed with a personalised email invitation containing a link to set up their Keeper Vault.</div><br><div>Former employees retaining active passwords pose a significant cyber risk, and securing passwords during the offboarding process is vital to an organisation's cybersecurity infrastructure. Upon an employee's departure, their system access must be revoked without delay. Password managers not only enable IT administrators to promptly withdraw access from ex-employees but also offer the option to conceal passwords for current employees within the platform. This measure prevents the copying of passwords through screenshots or written notes and facilitates the secure handover of accounts to successors.</div></div></div>
</div></div></div><div data-element-id="elm_jDrQvhd34KlHdgql0kWmnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jDrQvhd34KlHdgql0kWmnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:inherit;">7. Helpdesk Tickets</span></blockquote></h2></div>
<div data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gORBdiFYNvjpGSpTqDqbaw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is estimated that 40% of help desk calls/tickets pertain to password resets, each costing the business approximately £60. Envision a scenario where a multitude of employees are synchronised on a 90-day password renewal cycle; the impact on productivity could be substantial.</div><br><div><div>IT support teams can be targeted with <a href="/social-engineering" title="social engineering" rel="">social engineering</a> attacks aimed at password resets, they typically rely on static data to confirm an employee's identity, a password manager such as Keeper mitigates that risk.</div></div><br><div>Consider the potential accomplishments of your support team with a decrease in password reset calls/tickets!</div></div></div>
</div><div data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XMiedLkSDbN3LuSdJhW-Qw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Choosing Keeper as Your Organisation’s Password Manager</span></h2></div>
<div data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ttwT2UAFn52ebcWGZrYaJg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Keeper's Enterprise password management solution offers all the essential features required in a password manager, plus many additional benefits. The Keeper password manager operates on a zero trust and zero knowledge basis, ensuring that only the end user can access the plain-text data in their Keeper vault—Keeper's employees included.</div><br><div>With Keeper for Business, every employee receives Keeper across an unlimited number of devices, ensuring comprehensive protection throughout the company. Moreover, it includes a complimentary family plan for every employee.</div></div></div>
</div><div data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Mbtrah-GwXBkQaeecJpxzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Contact our friendly Cyber Security specialists at Actisoft today to find out how Keeper Password Manager can help you improve your security posture and protect your users and organisation.</span><br></p></div>
</div><div data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_IALmf4VTQTqnfQBBH5iSgg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/KeeperPasswordManager/formperma/905BpiQiQbXnwngYU5Ze23gRzb7UGx4G0hvTnsTcurI"><span class="zpbutton-content">Get Started Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 02 Jun 2024 12:42:22 +0000</pubDate></item><item><title><![CDATA[KPMG: Cyber Security Risk Is Now No. 1 Threat To Growth]]></title><link>https://www.actisofttechnology.com/blogs/post/kpmg-cyber-security-risk-is-now-no.-1-threat-to-growth</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1552533236-b76e85fca743?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDR8fGJ1c2luZXNzJTIwcmlza3xlbnwwfHx8fDE2MTY2ODY1OTE&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman KPMG in the UK just released their CEO 2021 Outlook Pulse Survey where glo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q"].zprow{ border-radius:1px; } </style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; margin-block-start:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_Ck3G1d6pwMblFmBZYtZ7uA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ck3G1d6pwMblFmBZYtZ7uA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div> KPMG in the UK just released their CEO 2021 Outlook Pulse Survey where global leaders were asked about their 3-year outlook.&nbsp; CEOs of the world’s most influential companies are planning what a return to ‘normal’ will look like. Nearly half (45 percent) expect normality to resume in 2022, with only one-third (31 percent) anticipating a return to normal in 2021. Significantly, 24 percent of leaders say that their business has changed forever. </div>
<p><br></p><div><div>When asked:&nbsp; <span style="font-weight:700;">Which of the following risks poses the greatest threat to your organisation's growth over the next 3 years?</span> the following graph was published. Note the change from position 5 in 2020 to position 1 in 2021:&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</div></div>
</div></div><div data-element-id="elm_eG1er8aqQ48uTY1opF-7lQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eG1er8aqQ48uTY1opF-7lQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_YUZuEc16m5fuaKPHIDzbEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YUZuEc16m5fuaKPHIDzbEg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6cxITlYs6ZPpcf1gtm4P5A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_6cxITlYs6ZPpcf1gtm4P5A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture1-1.png" size="original"/></picture></a></figure></div>
</div></div><div data-element-id="elm_piwnLiHA0tf38vn2zecWEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_piwnLiHA0tf38vn2zecWEw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_hgLIrHhWhQzClhyGSRx31A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_hgLIrHhWhQzClhyGSRx31A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" style="width:300px;"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_Aqm2YA-PfpFt66Hud7v1sg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Aqm2YA-PfpFt66Hud7v1sg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The full article is highly recommended. Here is a link to the KPMG site with the complete&nbsp; survey results:</div><p><br></p><div><div><a href="https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html" title="https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html" target="_blank" rel="">https://home.kpmg/uk/en/home/insights/2020/09/uk-ceo-outlook.html</a></div></div></div>
</div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Get Your&nbsp;<span style="font-weight:700;">CEO Fraud Prevention Manual</span></h2></div>
<div data-element-id="elm_6ILHK0LS5iBejG-H2I6Sgw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_6ILHK0LS5iBejG-H2I6Sgw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_IUgGdw5HTOvwEAIee8CRkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IUgGdw5HTOvwEAIee8CRkg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_fbCMlIsfU0h2iL9jSa88-A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fbCMlIsfU0h2iL9jSa88-A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div></div><div data-element-id="elm_vcoHv0TPSqcH1troVJLhAA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vcoHv0TPSqcH1troVJLhAA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WykhyEXIbsWetYBfphCmPQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_WykhyEXIbsWetYBfphCmPQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/CEOFraudPreventionManual/formperma/whtiWN4rVXw7uGo_frJIG9N8AyOoV4_0hX7_IQltdMg" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture2.jpg" size="small" style="width:300px;"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/CEOFraudPreventionManual/formperma/whtiWN4rVXw7uGo_frJIG9N8AyOoV4_0hX7_IQltdMg" target="_blank"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 25 Mar 2021 15:36:45 +0000</pubDate></item><item><title><![CDATA[The Security Risks of Working from Home]]></title><link>https://www.actisofttechnology.com/blogs/post/the-security-risks-of-working-from-home</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1547472751-ee012a99b3c9?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"/>With users now outside of the corporate firewall and outside of the office environment your risk surface will have increased. Add the ever-growing lis ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OjutFgLOQwCAhsnXnptYdA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WJoZ66JXTb28wFFT0JtYyg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_4nJRffeqQOiI_-2I5bQ86Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_4nJRffeqQOiI_-2I5bQ86Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__e5TfsFgRcKnLtDUVCryGg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm__e5TfsFgRcKnLtDUVCryGg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">What Should I be Considering?</h2></div>
<div data-element-id="elm_9WTWuGwnSkW-oFQzYJUVHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9WTWuGwnSkW-oFQzYJUVHg"].zpelem-text { color:#012a53 ; border-radius:1px; } [data-element-id="elm_9WTWuGwnSkW-oFQzYJUVHg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#012a53 ; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">With users now outside of the corporate firewall and outside of the office environment your risk surface will have increased. Add the ever-growing list of collaboration apps now used it has never been more important than now to consider the risk and threat to your business.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Do you foresee working from home being a more regular occurrence? Have you resisted employees working from home in the past?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">You may be considering making this more allowable than in the past, but you need to consider the increase in cyber risk, can you mitigate them? Yes, you can. In partnership with your users you can help them to work securely from home, that has always been a possibility. With a robust Remote Working Policy, you can ensure that your business is as well protected remotely as it is in the office.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">What are the main considerations I hear you ask?&nbsp;</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">With threats forever evolving a multi-layer of security is the best way to mitigate your risk, but you already know that?</span></p><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Train your users on how to spot a Phishing/Malicious communication, outside of the office they will not necessarily have their normal work colleague/s to ask if an email is genuine or not. Your users will also be more relaxed working from home, we’ve all heard of attendees in web meetings only wearing a presentable top half! Don’t let that relaxation become a security lapse.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Secure the home router! Most users will still have the default admin credentials in place, the password information is often easily found on the internet.&nbsp;</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Passwords are an issue either side of the corporate firewall, purchase a Password Manager for your users, allow them to also use it for personal accounts. This will maintain a good level of password hygiene. One that can generate secure passwords is best. With more collaboration apps being used it increases the risk of password reuse across platforms. It is not recommended to store passwords in browsers. <a href="https://www.howtogeek.com/447345/why-you-shouldnt-use-your-web-browsers-password-manager/">Article</a>.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Make use of Two-Factor/Multi-Factor Authentication everywhere that it is available and dependent upon the size of your organisation consider Identity &amp; Access Management for access to corporate resources &amp; apps. Recommend that users also enable 2FA/MFA for all their accounts where available. Don’t just aim security advice at corporate use, aim to get users to build it into all aspects of their digital life, long-term, the users and company will benefit from this approach.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Communicate to users the apps that are allowable for collaboration and restrict usage of non-approved tools. Guide your users and make sure that they are aware of what has now become a corporate tool.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Endpoint protection, no machine should be without this! Can you manage your endpoint protection remotely? A cloud-based product will allow easier management and ensure that your users have protection everywhere they work from whether that be in the office or remotely. Threats evolve quickly and a product with good Threat Intelligence behind it will improve your security posture.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Reduce the malicious emails hitting your user’s mailbox by having an Email Secure Gateway. They can’t click on a dodgy link if they don’t get it in the first place!</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Make use of a good VPN ensuring that they have a secure connection over the internet irrespective of where they are working. Make sure that it can be managed remotely.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Use a DNS Web Content filtering service to prevent access to dangerous and unwanted content. You possibly already have these content rules set up on your corporate firewall, but they need to be at client level to ensure that the same level of protection follows the users wherever they are working. They can also stop traffic going to malicious sites if a dodgy link is clicked on.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Use a Remote Management &amp; Monitoring product to ensure that you can manage your endpoints remotely, keep them up to date with patches &amp; be aware of what software is installed on them along with other activities that you need to do to maintain good security posture.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Backup, Backup &amp; Backup! A preventative approach to security is the best way to go but a good tried and tested backup can always save the day. Are your users saving more documents to their desktop now they are working from home? Backup your user machines as well as file storage, servers, databases etc to give you all round coverage.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">How do your users get rid of electronic information, do they just use the Windows delete function and clear out their recycle bin? Look at implementing a secure erasure process using available tools and set an organisation policy for the destruction of electronic information.</span></li><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Don't forget to ensure that all aspects of your insurance will cover you whilst employees work from home.</span></li></ul></ul><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></div><div><span style="color:inherit;"><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">This is by no means a comprehensive list but gives you a good start in maintaining security wherever your users are working.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Over the years business has been moving to a more mobile approach and the current crisis is going to accelerate that process, are you ready for that change?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Where to start?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Review your current security posture and asses your current risks and how they will change, how agile is your security? Will your security products cause productivity issues being used outside of the firewall?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Don’t forget about your users, there is a lot to consider. Think about how working from home will impact them, many will work more hours than they normally would. Technology doesn’t sleep and is available 24/7 but your users aren’t, and neither are you! Careful consideration should be taken to set guidelines to ensure that your teams are not over doing it as this can lead to mental health problems, I know that all too well from my own experiences. Have the ability to see if the guidelines are being followed.</span></p><p><span style="color:inherit;font-family:&quot;Open Sans&quot;, sans-serif;"></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Your users may also spend more time on Social Media whilst working from home which can also have negative effects - <a href="https://www.psychologytoday.com/us/blog/talking-about-men/202002/social-media-and-mental-health-time-digital-detox">Article</a>. There is no easy answer for this other than trying to educate your teams. Don’t just leave them to it, guide and support them through it, although some may have been asking for remote working in the past it can take a while to get a good routine going and it’s very easy to let that slip, we’ve all had a gym membership that hasn’t seen the outside of it’s holder at times! <a href="https://www.webroot.com/blog/2020/05/01/mental-health-and-mindful-tech/">Article</a>.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><span style="color:inherit;">Reach out to have a chat about any concerns or questions you may have, we love to find out how others are securing their business and any pitfalls they have come across that may help others in a similar position or situation</span><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="color:inherit;font-family:&quot;Open Sans&quot;, sans-serif;"></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;font-style:italic;">Actisoft Technology’s approach, and offering, is one built on the basis of Work Securely, Everywhere, Everytime adopting a cloud approach to security with remote central management. This works whether you work in an office or not. Talk to us about how we can partner to ensure that your business is secure from current, new and emerging threats.</span></p></span></div></div>
</div><div data-element-id="elm_dSPgwr8LTYmER6bJOcYFug" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_dSPgwr8LTYmER6bJOcYFug"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/ContactForm1/formperma/u_Bn1cXa8Z1Yr2o504NwScyshXma21tF9OX2IUs8aqE?referrername=blog"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 13 May 2020 08:34:14 +0000</pubDate></item></channel></rss>