A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Five Spring Cleaning Tips for Identity Protection Breadcrumb Home Insights Blog Five Spring Cleaning Tips for Identity Protection April 05, 2016 Five Spring Cleaning Tips for Identity Protection Spring cleaning is not just about creating space in closets, but is also a great time to organize your online passwords as well. Chances are you have passwords that haven’t been changed in over a year and you may even have the same passwords on multiple sites. We all know that’s a bad habit, but it's often not addressed. Now is the time to clean things up and create a password strategy that is easy to remember and keeps hackers from stealing your data. Follow the below practices to get in the habit of when managing your passwords. Use a Password Management Tool - Contact your IT department for their recommendation if you don’t already have one. Alternatively, do a simple online search for “password management tool” and select the one that is right for you. Audit Your Password Strengths - Never use generic words or names for your passwords. Avoid passwords such as 12345, hockey, your pet’s name (especially if you tell the world on social media what your pet’s name is), etc. Review Duplicate Passwords - If you are using the same passwords on multiple sites, change them. If one of your passwords becomes compromised, this helps ensure that hackers can’t use it against you on other sites. Avoid Writing Passwords Down - We know the urge may be there, but don’t use sticky notes as a password management tool. Use a System for Creating Unique Passwords - This can be any system you create, just make it unique to you. The below infographic lays out a step-by-step example of a password system. Following these simple steps will help ensure your data stays protected by effective passwords. By: Randy Pringle Solutions Marketing Manager Randy Pringle brings more than 15 years of integrated marketing solutions experience in the information security and technology space. Experience includes partner marketing strategies, thought leadership, campaign program designs and execution, and education and awareness. As a marketing manager, Randy focuses on strengthening marketing programs to help clients and employees learn behavioral changing tactics to protect personal and corporate data. Share: Threat Cybersecurity Information
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?