Is Your Business Protected by a Post-It Note?
- David Chernitzky
- May 26
- 4 min read
Updated: Oct 24

How to Strengthen Password Security for SMBs
Passwords are the digital front door to your business, and far too often, that door is left unlocked. For many small and medium-sized businesses (SMBs), the most significant cybersecurity risks aren’t sophisticated hacks, but rather simple, everyday habits: weak passwords, reused credentials, and skipped security steps, such as multi-factor authentication (MFA).
These oversights can lead to costly breaches, but the good news is that they’re also easy to rectify. In this post, we’ll break down the most common password pitfalls and show you practical ways to strengthen your defences, without overwhelming your team.
Most breaches start with weak or reused credentials; attackers recycle leaked logins across sites.
The Risks of Weak or Reused Passwords
A 2025 CyberNews study analyzing more than 19 billion exposed passwords found that 94% of passwords were reused or duplicated, meaning a single compromised credential can cascade across multiple accounts. (Cybernews). A single breached account can expose all other accounts secured with the same password..
Low-hanging passwords like “123456” or “Password1” remain commonly used and crackable in seconds. (NordPass 2024).
These poor practices create enormous risk for SMBs. A compromised login for one employee can escalate to:
Data breaches exposing sensitive client or financial records
Ransomware attacks or extortion
Loss of reputation, trust, and regulatory compliance liabilities
Because credential reuse enables credential stuffing attacks where hackers try stolen credentials across many services protecting every login matters.

Sources: Cybernews, Microsoft, Okta
Common Password Pitfalls in the Workplace
In practice, many organizations fall into patterns that undermine their security:
Reusing passwords across multiple systems
Sharing credentials via email, chat, or spreadsheets
Skipping MFA even when available
Failing to change passwords after a breach or regularly
Storing passwords in unsecured documents
Relying on shared logins instead of unique user accounts

How SMBs Can Improve Password Practices
Use Passphrases Instead of Passwords Use long passphrases (aim 12–16+ characters) that are easy to remember and hard to guess, think ‘three random words. NIST advises allowing long passwords, checking against breach lists, and avoiding forced periodic changes.
Enforce MFA Everywhere According to a 2024 Okta report, 66% of workforce users had MFA enabled, and 91% of administrators used MFA. (Okta) Microsoft finds MFA blocks >99.2% of account-compromise attacks
Deploy a Password Manager Solutions like 1Password, Bitwarden, or LastPass allow users to generate and store unique credentials securely, eliminating the need to remember or reuse passwords. CISA recommends password managers for SMBs to keep passwords unique and out of emails/spreadsheets.
Provide Ongoing Training & Awareness Short, targeted refreshers can help reinforce secure habits. Teach employees to recognize risky behaviors and internalize better practices.
Establish a Simple, Enforceable Password Policy Set simple rules: minimum length
Real-Life Example:
Consider the 2023 data breach at 23andMe, where approximately 14,000 user accounts were initially compromised due to reused usernames and passwords from previous data leaks. This breach expanded exponentially, exposing sensitive personal and genetic data of approximately 5.5 million users. The attack underscores the increasing threat of credential stuffing, exacerbated by poor password hygiene and the absence of robust security measures such as MFA.
Final Thoughts
In a cybersecurity world crowded with flashy solutions, the foundation that matters most is human behavior. For SMBs, consistently strong password practices are often more critical than advanced tooling.
By adopting passphrases, enforcing MFA, using password managers, and educating your team, you build a human firewall that complements any technical control. The time to act is now—strong security begins with consistency.
Would you like assistance in designing password policies, deploying MFA strategy, or training your team on safer credential habits? We’re ready to help. Call us today.
Password Habits Q&A
1. Q: Why are reused passwords such a big deal if they’re strong?
A: Even strong passwords become dangerous if reused. If one site you use is breached — and that password is leaked — attackers will try it on other sites using automated tools. This is known as a “credential stuffing” attack, and it’s one of the most common methods cybercriminals use to gain access to business systems.
2. Q: Is multi-factor authentication (MFA) really necessary for every account?
A: Yes — especially for email, cloud tools, and admin accounts. MFA stops over 99% of credential-based attacks, according to Microsoft. It adds an extra layer of security by requiring something you know (your password) and something you have (a code, token, or app approval).
3. Q: What's the difference between a password and a passphrase?
A: A password is usually a short string of random characters (e.g., “Xy!7eR#”). A passphrase is longer and often easier to remember — like “CoffeeTable!Shark52.” According to NIST, a 12+ character passphrase is often more secure and user-friendly than a complex but short password.
4. Q: We use shared team accounts. How can we manage those securely?
A: Ideally, each user should have individual access, but if shared accounts are unavoidable, use a team-based password manager like Bitwarden Teams or 1Password Business. These tools allow secure sharing, audit trails, and automatic password generation — all without exposing credentials in plain text.
5. Q: How often should passwords be changed?
A: It depends. If you’re using MFA and unique passwords via a password manager, regular changes aren’t always necessary. But if a breach is suspected or an employee leaves the company, update passwords immediately. Set policies that balance security with usability.