Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Tags: ConnectivityCybercrimeManaged Security Servicescyber threatsData ProtectionCloud Backup; Backup; Cloud RecoveryCloud ServicesDisaster RecoveryRansomware
Author: Scott Gray
Date: November 20, 2023

Revolutionizing Cybersecurity: Global Coalition Unveils Password Guidance!

Get ready to witness a game-changing moment in the world of cybersecurity and passwords!

An impressive coalition of over 90 nonprofit organizations, including Consumer Reports and the Better Business Bureau, just dropped a brand-new directive protecting your accounts and devices called “The Common Guidance on Passwords.”  This announcement sets the stage for the grand inauguration of “World More Than a Password Day,” which was on November 10, 2023. This global movement emphasizes the importance of stronger online authentication and provides essential guidance for businesses and individuals.

Did you know that a staggering 80 percent of data breaches are attributed to the vulnerability of passwords? It’s time to bid farewell to the era of flimsy and repeated keywords and welcome a new age of robust authentication methods that leave cyber threats in the dust.  This is exactly what the Common Guidance on Passwords sets out to do with five simple steps.

 

“Embracing multi-factor authentication is a decisive step in safeguarding our assets. It’s an investment in a triad of security: enhancing processes, empowering people, and leveraging technology to fortify our organization’s future.”  

– Tom Brennan, Co-Chair of Nonprofit Cyber Steering Committee

 

Here is a brief overview of this new guidance crafted by over 90 cybersecurity non-profits that certainly will resonate with both IT and business professionals alike!

In short, say goodbye to Passwords!  Say hello to a world with magic passkeys. They’re not just convenient; they’re the protection you need.

Guardian of Your Inbox:  Transform your email into a digital fortress with robust passwords and the attentive watch of multi-factor authentication (MFA).

Double Down on Security:  Beef up your defenses with hardware keys, authenticator apps, or SMS PINs – because a little extra prevents phishing, malware, and other cyberattacks.

Sidekick Password Manager:  Meet your trusty sidekick – the password manager. Using a password manager means using strong, randomly generated passwords that are much harder to guess.  It crafts and stores flawless passwords for all your digital undertakings.

Password Creation Mastery:  Level up your game with pro techniques –passphrases or the cool “Three Random Words” method.  Combining three random words creates a strong password that is often long enough and strong enough.  Weak passwords can be cracked in seconds. The longer and more unusual your password is, the harder it is for cybercriminals to crack it.

Emergency Response:  When the digital storm hits, change those passwords immediately! No repeats are allowed. Explore services like https://haveibeenpwned.com/ to keep your online world secure.

 

Remember, while two-factor and multi-factor authentication are extremely critical in the fight against cybercrime, the best strategy is multi-layered and should include employee training, tools, and processes to defend and protect your networks and data from bad actors.

While with a strategic layered approach, these services and solutions won’t achieve complete and total protection, they will allow your organization to substantially minimize risks and reinforce its cyber defenses.

At 11:11 Systems we are committed to helping organizations of all sizes better protect their sensitive data and infrastructure with an extensive portfolio of cloud, connectivity, and security solutions.  These services provide the necessary expertise to proactively manage and address cyber threats safeguarding your most valuable digital assets.

 

 

For more information on 11:11’s vast portfolio of services please check out the following links:
  • Cloud Services
  • Backup Services
  • Disaster Recovery
  • Managed Security Services
  • Connectivity Solutions
Categories: Cybercrime, Ransomware, SecurityBy Scott GrayNovember 20, 2023
Tags: ConnectivityCybercrimeManaged Security Servicescyber threatsData ProtectionCloud Backup; Backup; Cloud RecoveryCloud ServicesDisaster RecoveryRansomware

Author: Scott Gray

Scott Gray is a Product Marketing Manager at 11:11 Systems focused on managed security where he helps create product messaging and communications. As a "product guy" at heart, Scott has over 30 years of experience working in the IT and Consumer Electronics industries. Before joining 11:11 Systems Scott held roles at Compaq, Dell, HP, Panasonic, and Sharp in a variety of product management and product marketing roles. Scott graduated with a master's degree in International Business from Roosevelt University and also holds an undergraduate degree in Marketing from Oklahoma State University. Scott enjoys spending time with his family and is an avid sports fan.

Post navigation

PreviousPrevious post:11 Tips for Cyber Security SuccessNextNext post:Part 2: What cybersecurity measures can insurance companies and providers take to thwart cyberattacks like ransomware

Related Posts

Digital Operational Resilience Act (DORA)
Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
July 10, 2025
vulnerability management
A Modern Approach to Managing Vulnerabilities
May 30, 2025
Cyber Resilience
Data Protection vs. Cyber Resilience: Mastering Both in the Complex World of Gambling
May 27, 2025
ransomware attack, worst day
The Remedy Against Ransomware: Insights from Our April 2025 Webinar
May 19, 2025
Cyber Resilience
Reimagining Cyber Resilience in the Gambling Industry: A Strategic Imperative for the Digital Age
May 13, 2025
effective passwords
Creating Effective Password Policies in Your Organization
May 5, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top