This website uses cookies

This website uses cookies to ensure you get the best experience. By using our website, you agree to our Privacy Policy

Alastair Murray

Director, The Bureau

Quotation Marks
“Adopting a no-nonsense zero trust approach is an emerging standard where everyone is treated with suspicion”

‘Prove it’: online password safety

‘Prove it’: online password safety


Alastair Murray explores how internet users can protect their passwords online

Traditionally, the office front door was locked and we went home safe in the knowledge that it was secure. In today’s digital world of mobile phones and cloud servers, far more is needed.

The switch to home working caused by the covid-19 crisis resulted in many security issues, with strong office system firewalls being replaced by poorer home computer security. Office password regimes with their usual strict security protocols were diluted by poorer technology in the home, and left some firms vulnerable to data breaches and malware.

Most computer servers, whether in offices, in the cloud or on the web are protected by firewalls, antivirus programmes and a collection other security safety tools. While these all remain vital, their effectiveness in a cloud-based world is becoming less certain. The adoption of a no nonsense zero trust approach is beginning to make more sense.

New security doctrines that require proof of identity before access is granted have grown in popularity, with zero trust policies on the rise. These types of policies are being adopted by more firms throughout the world. By defining who has access to the firm’s resources, you build a better security regime.

Zero trust authentication is still evolving and developing new strengths by going a step further in approving the computer device the user is accessing. The use of bring your own device (BYOD) has been responsible for a lot of cyber and data breaches over the years, and so identifying the machine the user is accessing delivers another layer of security.

Law firms have learnt from their mistakes in ‘lockdown’ and beefed-up home working security, even introducing ‘password policies’ for home workers. This helps to create a regime of ‘best password practice’ and the adoption of new rules at firms and other organisations.

Zero trust environments demand that each individual machine and/or device identities and verifies which machine is being used by which employee. Having a firewall is all well and good, but now most firms have multiple machines in and outside the office walls, especially as so many employees are working from home today, this is now not enough.

The practice of password reuse by employees working from home is beginning to diminish and moving towards office style security. Many covid-19 -related cyber security breaches were the result of bigger break-ins at large service providers like Amazon, Google and others, where thousands if not millions of passwords were stolen. Cyber criminals simply ran through these stolen passwords until they found a match. The introduction of stricter policies on passwords reduces the chances of this happening.

While system administrators and/or practice managers should have their password management regimes under control, it is worth reviewing and reinforcing password security standards. Having a ‘password policy’ in place, whether formalised in a written document or not, should include at least the following basic standards to ensure employees working from home keep their firm’s data safe.

Passwords should be a least eight numbers and characters long. In other words, complicated, using special symbols, capitals, and numbers. Password should be unique – no duplicates. Passwords should always have at least two-factor authentication where the user receives an authentication code to their mobile or similar device.

Incorrectly entered passwords should have a disabling mechanism after a number of attempts, forcing the user to call-up the admin, office or practice manager. Passwords should facilitate access to only those duties performed by the employee. This helps prevent access to more sensitive data requiring stricter controls.

A ‘review regime’ is helpful, where ‘permissions’ are reviewed and down or upgraded as appropriate. Employees who used to have access to particular types of data, might have left the firm or no longer require the same level of access, and others may need to be upgraded owing to a promotion or new role. 

Since most of home working today accesses the firm’s cloud-based services or internal servers, it is vital that this is limited to only those with permission. Adopting a no-nonsense zero trust approach is an emerging standard where everyone is treated with suspicion. Until a user can prove they are who they say they are, access is denied. A platform like this can be applied to the cloud, webservers, mobile phones, travelling sales reps and homeworkers with each required to confirm their credentials.

Creating a stronger sense of security that is real and active promotes greater productivity as well as delivering a deeper and longer lasting security within the firm. In an increasingly mobile and digital world where almost everything is transmitted digitally, and more often than not from outside the comparative safety of the office network and cloud systems, zero trust protocols need to persist.

On a zero-trust platform everyone is treated the same – with suspicion. Until a user can prove who they are through a software defined perimeter (SDP), access will not be granted.

A zero-trust platform can be applied to the cloud, webservers, mobile phones and homeworkers, with each required to confirm:

·        their identity – authentication;

·        they are on a sufficiently secure connection;

·        they are authorised to access the resources they need;

·        which device they want access from;

·        where they are – on a business network or café wi-fi.

There are numerous useful internet resources to learn more about passwords and how to protect data. The National Cyber Security Centre (NCSC) website is particularly good, offering a ‘Small Business Guide’ on cyber security and how to apply this to your firm.

One of the most common mistakes made by firms is forgetting or simply not bothering to change the manufacturers' default passwords that smartphones, laptops, and other types of equipment are issued with. This is an essential task before distributing phones and other digital devices to staff that ensures cyber criminals do not break in on day one. The site also has advice on encryption, authentication, secure lock-ups for mobiles and tablets, phishing, and keeping smart phones safe. The NCSC also have useful guides on passwords and other related topics.

Microsoft’s website at also offers good advice on ways to manage your passwords, how to resist common attacks as well as containing them and understanding human behaviour.

A zero trust policy trusts nobody, even the chief executive must ‘prove their identity’.

Alastair Murray is director at The Bureau