Solved

Company IT infrasture username/password best practise

Posted on 2014-04-22
7
258 Views
Last Modified: 2014-05-12
what is the latest best practise on the above record keepting interms of international Std and audit purpose
0
Comment
Question by:cur
7 Comments
 
LVL 25

Assisted Solution

by:Tony Giangreco
Tony Giangreco earned 40 total points
ID: 40014575
Here are the guidelines we use which are directly from Microsoft:

http://windows.microsoft.com/en-us/windows-vista/tips-for-creating-a-strong-password

Hope this helps!
0
 
LVL 16

Accepted Solution

by:
Shaik M. Sajid earned 50 total points
ID: 40014584
0
 
LVL 53

Assisted Solution

by:McKnife
McKnife earned 80 total points
ID: 40014756
Hi cur.

> in terms of international Std and audit purpose
These are empty phrases. Could you phrase what you need, in your own words?
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 25

Assisted Solution

by:madunix
madunix earned 40 total points
ID: 40016836
0
 

Author Comment

by:cur
ID: 40016875
I am more concern on the password store facilities . in  case of top iT people absence
0
 
LVL 53

Assisted Solution

by:McKnife
McKnife earned 80 total points
ID: 40016890
So what would you like to know? Please ask some questions that one can answer. As we don't know your situation, we cannot answer "best practice"-questions.

Of course if the admin is absent, someone else will have access to a password database like keepass or to a printed document, usually kept in a safe.
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40027955
Have we answered your question completely?
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Ransome Ware Question 10 138
Server 2008-R2 lost password 19 97
optimal method deal ransomware in files folders 9 96
Trunk and Port Security 4 39
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now