{"id":39335,"date":"2020-03-26T12:50:27","date_gmt":"2020-03-26T08:50:27","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=39335"},"modified":"2025-11-21T14:24:50","modified_gmt":"2025-11-21T10:24:50","slug":"password-management","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/password-management\/","title":{"rendered":"Password Management Best Practices for MSPs"},"content":{"rendered":"<p>The global cybersecurity landscape is evolving and continues to grow more dangerous by the day. More and more hackers are exploiting the relationship between organizations and their MSPs to compromise IT assets.<!--more--><\/p>\n<p>Since MSPs have unfettered access to their clients\u2019 IT environments, gaining control of MSP remote management consoles provides attackers with access to privileged credentials. Given this risk, MSPs need to secure credentials and enforce password management best practices to prevent attackers from exploiting their clients.<\/p>\n<p>To help you get started, let\u2019s take a look at some password management best practices for MSPs.<\/p>\n<h2>Multi-Factor Authentication (MFA)<\/h2>\n<p>While <a href=\"https:\/\/www.msp360.com\/resources\/blog\/mfa-for-msps\/\">MFA<\/a> was a \u201cnice-to-have\u201d feature in the past, it has become a \u201cmust-have\u201d in the face of today\u2019s sophisticated cyberthreat landscape. If the software you or your clients use comes with multi-factor authentication, never turn it off. Be sure, too, to educate clients on the benefits of MFA and on how they can take advantage of it to ensure secure access to business-critical data and applications.<\/p>\n<p>To get the most out of MFA, consider taking a layered approach to password security by leveraging biometrics, code-generating\/hardware tokens, and other criteria (where possible) to ensure that there isn't a single point of failure in your IT ecosystem.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/two-factor-authentication-solutions\/\">Two-Factor Authentication: Solutions, Methods, Best Practices<\/a><\/p>\n<h2>Employ a Password Generator Tool<\/h2>\n<blockquote><p>The best passwords are randomized strings of text containing lower and upper case letters, as well as special and alphanumeric characters.<\/p><\/blockquote>\n<p>Since users have to create such random passwords for every account they own, they may have trouble remembering all the passwords \u2014 and as such, they end up creating passwords using text they can easily remember. To simplify this process, enterprises should use a password generator tool to create truly random strings based on character type requirements and length.<\/p>\n<h2>Use Centralized Access Management for Privileged Credentials<\/h2>\n<p>As an MSP, not only do you hold privileged passwords for your organization, but you also have access to those of your clients as well. To reduce the risk of malicious activities on company and clients\u2019 businesses, MSPs need to centralize password management to see who is accessing what credentials and when they accessed them.<\/p>\n<p>A centralized password management solution gives you full control over all credentials and allows you to grant access to admins on a case-by-case basis. No admin should have access to all privileged credentials. Also, a centralized solution helps in tracking and logging the access history of IT admins. Once an IT admin leaves, you can pull the history of all the credentials accessed and change them.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/iam-vs-pam-vs-pim\/\">IAM vs PAM vs PIM: Guide to Access Management<\/a><\/p>\n<h2>Rotate Passwords<\/h2>\n<p>Your password management policy must include rules on how often your IT admins and client employees should change their passwords. Create and enforce policies that govern the rotation of passwords for the following accounts:<\/p>\n<ul>\n<li>In-house systems and services<\/li>\n<li>Line-of-business applications<\/li>\n<li>Cloud services and portals<\/li>\n<li>Network appliances<\/li>\n<li>Clients\u2019 systems accounts<\/li>\n<\/ul>\n<p>However, do note that passwords should be changed and not recycled. When changing passwords, ensure that the new password is completely different from every other password ever used with that credential.<\/p>\n<p id=\"last\">In particular, passwords to the accounts outlined above must be changed instantly when a breach is detected. This mitigates the spread of malware and ransomware and prevents hackers from gaining further access to your servers, networks, and databases.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>In line with cybersecurity best practices, you need to change passwords for privileged credentials with access to sensitive data at least once every 3 months. To reduce the risk of malicious exploits from former staff, you should also change all passwords they may have had access to within six months of their exit.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-best-practices\/\">MSP Best Practices<\/a><\/p>\n<h2>Educate Clients on Password Best Practices<\/h2>\n<p>To remain secure, MSPs need to create and enforce rigid password management policies for client organizations. However, these policies won't be effective if clients are not aware of them. You should, therefore, educate both your techs and client employees on these policies. Inform them of the importance of maintaining password best practices at all times and on all levels \u2014 even for accounts that they deem unimportant.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Educational Posters on Password Security<\/div>\n<div class=\"call-to-action__text\">\n<p>The poster pack includes:<\/p>\n<ul>\n<li>Best practices for creating strong passwords<\/li>\n<li>Reminders on how secure passwords should look like<\/li>\n<li>A chart to check if your password is secure enough<\/li>\n<\/ul>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-88fb277b-8296-40db-9698-b362eb68ccaa\" data-portal=\"5442029\" data-id=\"88fb277b-8296-40db-9698-b362eb68ccaa\"><span class=\"hs-cta-node hs-cta-88fb277b-8296-40db-9698-b362eb68ccaa\" id=\"hs-cta-88fb277b-8296-40db-9698-b362eb68ccaa\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/88fb277b-8296-40db-9698-b362eb68ccaa\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-88fb277b-8296-40db-9698-b362eb68ccaa\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/88fb277b-8296-40db-9698-b362eb68ccaa.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 40%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/04\/MSPs-Educational-Posters-on-Password-Security.png\" alt=\"Whitepaper icon\" \/><\/div>\n<\/div>\n<h2>Know What Kind of Passwords Not to Use<\/h2>\n<p>The widespread use of commonly known passwords has been linked to several data breaches in recent years. The most popular password strings in use include:<\/p>\n<ul>\n<li>000000<\/li>\n<li>123456<\/li>\n<li>password<\/li>\n<li>123456789<\/li>\n<li>qwerty<\/li>\n<li>abc123<\/li>\n<li>login<\/li>\n<li>admin<\/li>\n<li>iloveyou<\/li>\n<\/ul>\n<p>While this should be obvious, you may be surprised by the number of employees who use these passwords for enterprise accounts.<\/p>\n<h2>Wrapping Up<\/h2>\n<p>You can mitigate the risk of cybercriminals comprising your clients\u2019 IT systems and data by creating and enforcing strict password management policies. Most data breaches can be prevented if MSPs and clients protect privileged accounts with non-recycled, complex passwords. Following through on the security best practices outlined above can help reduce threats from the password\/user credential threatscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The global cybersecurity landscape is evolving and continues to grow more dangerous by the day. More and more hackers are exploiting the relationship between organizations and their MSPs to compromise IT assets.<\/p>\n","protected":false},"author":59,"featured_media":39336,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-39335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/39335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=39335"}],"version-history":[{"count":4,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/39335\/revisions"}],"predecessor-version":[{"id":61384,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/39335\/revisions\/61384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/39336"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=39335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=39335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=39335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}