• Texaport provides best in-class, certified cyber security services to protect businesses from online threats.

          Incident Response Center

          If you are currently experiencing a cyber attack, contact our response desk immediately.

        • Texaport is a Managed Service Provider delivering a complete portfolio of IT solutions to support our clients’ operations across the UK and throughout the globe. 

    • Articles, News & Case Studies

      Thought leaders in the global IT sector
  • Contact


IT Support Password Management

What would you do if your customers stopped paying your invoices? How would your business react if the payments due to you were being paid to a cyber-criminal instead? The situation would be less than ideal to put it lightly. The importance of password protection and management is growing exponentially as Cyber-Criminals are finding new and more innovative ways to gain access to company systems. This is exactly what can and is happening with hundreds of businesses throughout the UK on a daily basis and there’s two root causes for this:

  • Spoofing Identify by appearing as your business by creating a new fake email address designed to look like your business and your invoice templates
  • Gaining access to your legitimate email account and/or invoicing platform

To combat these and help protect your business Texaport recommends employing a multi-layered “Holistic” approach to your business’ IT Security. A cornerstone of which is user-awareness and “good password/account hygiene”. The key to securing your company, users and hardware is to ensure your passwords are always secure as they are the key to your digital life and business and should be treated as you would the keys to your business, home or car. If you lost your keys or had reason to believe they’d been copied or compromised, you would change your locks. If you have reason to believe your password is not secure or has been copied, you should change it.

Cyber-Criminals can gain access to your business email account and invoicing platform passwords in two common ways (there are others but most employ one or both of these methods in their execution):

Brute Force

Brute force is a method of “cracking” a password through trial and error. The Cyber Criminal would run a program which cycles through potential passwords until the right one is discovered. Once it has been discovered, the criminal has access to the account(s) as well as any other services that password would be used for. TO find those services the criminal would typically search through emails to find notifications from services such as eBay, Amazon, Xero etc.

Brute Force can be limited in effectiveness by:

  • Using unique passwords for each service
  • Limiting the number of password attempts before locking down the account
  • Increasing the length and complexity of a password.

Spoofing a legitimate email

A common and incredibly easy method for criminals to gain access to your important accounts is to send an email appearing to be from your provider asking you to sign in. The links may seem legitimate and the page they take you to could also appear to be correct. Once you have submitted your information the page will redirect you to the legitimate service to login again and you would have no reason to believe you’d been compromised.

Spoofing can be limited in effectiveness by:

  • Not following links in emails
  • Paying attention to the sender’s email address
  • Paying attention to the link in the email and ensuring it is legitimate
  • Verify the web address you have gone to is legitimate
  • Deploying a “Web Filter” which would block malicious or impersonating websites.

As cyber criminals are able to exploit new vulnerabilities and deploy new tools to attack businesses and their supply chains, companies should be employing a holistic approach to the security and integrity of their data, hardware and users to reduce the risk of this. Hardware and Data security are essential components of an approach to security, but these are redundant if the end user is unaware of the threats and can usher a criminal through the defences to sensitive data or systems.

Some key considerations in securing your password are:

  • A strong, enforced, password policy
  • Don’t share your password(s)
  • Don’t re-use your password(s)
  • Store your password(s) securely
  • Change your password if you are concerned that it might have been compromised, shared or breached.

Password security an integrity is a key element of data protection and Cyber Essentials, to find out more about securing your organisation, users, hardware and software email [email protected].


IT Support, Case Study

Read our Reviews

More articles

IT Support

Your IT Support issues are resolved immediately at the first point of contact so you can get on with what's important


We hold Cyber Essentials Certification and Microsoft Silver Competency, reinforcing our commitment to quality


Secure your business from within. Enabling you to create a security-focused culture with automated training within your business


Keep your team connected with Texaport's suite of business grade connectivity and information communication solutions

Managed Services

Outsource your Managed IT Services, improve your operations and cut your expenses


Providing the lifelines to your communications with structured cabling design and instalation

Cloud Services

Take your business higher with Texaport's Cloud Consulting, Cloud Migration and Cloud Management

IT Consultancy

Tap Into our strategic experience with our project management and IT Consulting services

Would you like to leave us a Google review?

Would you like to leave us a Google review?

Would you like to leave us a Google review?

Contact us for more information