03-24 - Mini-Guide - Password Playbook For Small Businesses
03-24 - Mini-Guide - Password Playbook For Small Businesses
03-24 - Mini-Guide - Password Playbook For Small Businesses
1
Threats and vulnerabilities
As your business grows, so do you and your team’s responsibilities.
One important area that will continue to demand your attention?
2
Productivity challenges
Protecting your company and data from cybersecurity threats.
3
Real-world examples
Data breaches and leaks are now a concern for all companies,
regardless of size. But small businesses have the added challenge
4
Checklist: common accounts
of limited staff and resources that can be dedicated to
cybersecurity tasks—and you’re already wearing more than
5
Getting started with a enough hats.
password manager
The good news? A password manager helps you safeguard
sensitive information and protect your business—and brand
6 Next steps reputation—while boosting employee productivity.
ransomware attack in the last two years, and 92% predicted that these attacks No. of employees
will get worse.3
Cost
1–9
$7,000
You work hard to grow your business and serve your customers. You can’t afford a 10–49
$17,000
data breach, which could result not only in devastating financial costs but also in 50–249
$50,000
loss of customers and business opportunities. To protect your growing company, 250–000
$133,000
you need the tools to secure your data access and accounts. *Based on data from eight countries
Source: Hiscox, “Hiscox Cyber Readiness Report,” 2020
83%
cybersecurity in-house, fewer than 10% of those businesses have an employee
dedicated to IT. Cybercriminals know that small businesses don’t have the staff
and resources to devote to cybersecurity—and that’s why they see small
businesses as easy targets for attacks.
In the typical small business, IT duties like managing passwords often fall to the owner, general Are passwords impacting your
manager, webmaster, or some other employee who has various other day-to-day responsibilities. And if productivity? You’re not alone.
there’s an IT admin, that employee is already stretched thin, wearing many hats from help desk and In a 2021 survey of 1,000
network management to email administration and cybersecurity. Employee password resets and other employees, Dashlane found that:
password management tasks place an unnecessary burden on whoever fulfills the admin role.
For individual employees, keeping track of passwords can also be frustrating, as can the time spent
typing in credentials whenever they need to access a cloud service. That’s why many resort to shortcuts Source: Dashlane, “The Future of
Security in the Hybrid Workforce,” 2021
like storing passwords in web browsers, compromising the security of your accounts and data.
3 | Real-world examples
Data breaches that make the biggest headlines often involve large companies or massive numbers of impacted
consumers. But small businesses suffer cyberattacks and data breaches just as regularly as big enterprises. Although
those incidents often fly under the public radar, there are still plenty of examples of how small businesses get hit.
And, of course, there’s no shortage of headlines about cyberattacks and data leaks involving cloud services and apps that
small businesses use. When these providers experience a data breach, their user account credentials are typically sold or
leaked on the dark web. Cybercriminals count on the fact that many of those users recycle their logins for other websites
and services, and the attackers use these compromised credentials to gain access to other systems and services.
These three incidents illustrate some of the password-related risks and implications for small businesses.
Grubman Shire Meiselas & Sacks, a small but prominent A couple of years ago, Facebook had a massive breach that
legal firm for the entertainment industry, came into the exposed some 600 million passwords (stored in plain text for
spotlight in 2020 after cyberattackers stole 756 gigabytes more than seven years!).3 Surveys show that 63% of people
of PII and other sensitive data on the law firm’s high-profile reuse passwords.4 So chances are high that some of your
clients (which include Hollywood A-listers, top athletes, and employees reuse their personal login credentials for
famous performers). The cybercriminals initially requested corporate accounts. By doing so, they’re making a
a $21 million ransom but doubled it when the company cybercriminal’s job ridiculously easy.
The more accounts, the higher your security risk if you’re not using
failure to change passwords regularly, and the lack of 2FA are among the
MailChimp Salesforce
Zoom Slack
Facebook Xero
Instagram Gmail
Asana Calendly
Monday.com Dropbox
Is this password
Is this login How is it
Account Owner? Is 2FA set up? used for other
shared? shared? accounts?
And you can rest assured that your data is always secure. We use the
strongest encryption available and zero-knowledge security architecture, so the
info stored in each account is only accessible to the individual user. Plus, two-
factor authentication is built right in.
Complicated rollout and onboarding processes can hinder The Group Sharing feature allows Dashlane users to easily
adoption of tools like password managers, especially for a and efficiently share passwords and Secure Notes, making
growing business. As your security practices mature and you onboarding easy and secure. Admins can create groups
adopt new tools like single sign-on (SSO), Dashlane helps based on departments or company needs in the Admin
admins simplify onboarding. In addition to support for SSO, Console. Once created, both admins and individual users
we offer video tutorials, guides, and templates to help you can share information with these groups via the app. With
with successful adoption and onboarding.
Now that you’ve got the basics down, let’s talk about what’s
next and some of Dashlane’s more advanced features.
Dashlane monitors the dark web for Every user gets a Password Health Score Keeping your company data and
compromised credentials. When that shows a breakdown of weak, reused, reputation protected is not simply
Dashlane finds an employee’s username or compromised passwords. In the Admin about the tools and processes you
and password on the dark web, those Console, you’ll be able to access your use—it starts with your employees.
credentials are immediately flagged in reporting dashboard. The dashboard’s Dashlane enables admins to make
the app. The app prompts the employee centralized view gives you unprecedented employees part of the security
to change the password—and provides visibility into your company’s password conversation and educate them about
a password generator for creating a security and the ability to track their active role in protecting your
strong, random password. Employees improvements over time. There, you’ll organization.
Follow us on: