{"id":3210,"date":"2025-10-09T04:19:11","date_gmt":"2025-10-09T09:19:11","guid":{"rendered":"https:\/\/cmitsolutions.com\/boston-ma-1020\/?p=3210"},"modified":"2025-10-08T04:31:34","modified_gmt":"2025-10-08T09:31:34","slug":"how-to-manage-passwords-without-losing-your-mind-or-sticky-notes","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/how-to-manage-passwords-without-losing-your-mind-or-sticky-notes\/","title":{"rendered":"How to Manage Passwords Without Losing Your Mind (or Sticky Notes)"},"content":{"rendered":"<p><span style=\"font-weight: 400\">If your team is still juggling passwords on sticky notes, spreadsheets, or memory, you\u2019re living on the edge and not in a fun way. For small and midsize businesses, one weak credential can snowball into account takeover, downtime, and compliance headaches. The fix isn\u2019t a single tool; it\u2019s a clear, business-ready system that makes strong passwords easy for people to use every day.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Below is a practical, leader-friendly framework to tame passwords without slowing work or blowing the budget.<\/span><\/p>\n<h2><b>Step 1: Standardize What \u201cGood\u201d Looks Like<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Before you deploy anything, define the rules. Your policy should be short, enforceable, and aligned to risk.<\/span><\/p>\n<h3><b>Minimums that actually work:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Length first: 12\u201316 characters (passphrases beat clever short strings).<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Uniqueness: one password per account\u2014no reuse.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Rotation: change after suspected compromise, vendor breach, or role change.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">MFA everywhere: require a second factor for email, finance, HR, cloud, and admin tools.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Blocklists: disallow common, leaked, or company-related phrases.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Policy is only as strong as the guardrails you can enforce across devices and apps. Central monitoring through <\/span><b>directory, SSO, and MDM<\/b><span style=\"font-weight: 400\"> keeps rules consistent. If you need a stronger foundation, start with resilient<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/network-management-done-right-the-key-to-a-faster-safer-and-smarter-business\/\"> <span style=\"font-weight: 400\">network management<\/span><\/a><span style=\"font-weight: 400\"> to ensure every endpoint follows the same playbook.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-3213\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-cmit-boise-featured-image-2025-10-08T035510.066-1024x535.png\" alt=\"\" width=\"781\" height=\"408\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-cmit-boise-featured-image-2025-10-08T035510.066-1024x535.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-cmit-boise-featured-image-2025-10-08T035510.066-300x157.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-cmit-boise-featured-image-2025-10-08T035510.066-768x401.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-cmit-boise-featured-image-2025-10-08T035510.066.png 1200w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/p>\n<h2><b>Step 2: Deploy a Business-Grade Password Manager<\/b><\/h2>\n<p><span style=\"font-weight: 400\">A password manager is the difference between \u201cwe hope\u201d and \u201cwe know\u201d when it comes to complexity and uniqueness.<\/span><\/p>\n<h3><b>What to require in your selection:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><b>Zero-knowledge encryption<\/b><span style=\"font-weight: 400\"> for vaults and shared folders.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>SSO integration<\/b><span style=\"font-weight: 400\"> to simplify onboarding and offboarding.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Role-based access<\/b><span style=\"font-weight: 400\"> with fine-grained controls for shared credentials.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Breach monitoring<\/b><span style=\"font-weight: 400\"> to flag reused or exposed passwords.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Audit trails<\/b><span style=\"font-weight: 400\"> for who accessed what and when.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<h3><b>Rollout tips that boost adoption:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Import existing passwords during setup so teams start day one productive.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Create shared vaults by function (Finance, Ops, Projects) to cut shadow sharing.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Train with live examples show how it autofills, generates, and rotates.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Pair the rollout with targeted awareness around<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/spotting-phishing-attempts-eight-essential-tips-for-protecting-your-business\/\"> <span style=\"font-weight: 400\">phishing tips<\/span><\/a><span style=\"font-weight: 400\"> so employees know when <\/span><i><span style=\"font-weight: 400\">not<\/span><\/i><span style=\"font-weight: 400\"> to type a password at all.<\/span><\/p>\n<h2><b>Step 3: Protect the Big Targets First<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Not all accounts carry the same risk. Triage your high-value assets and harden them first.<\/span><\/p>\n<h3><b>Prioritize:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Email and identity (Microsoft 365\/Google Workspace)<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Finance and payroll systems<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Source code, IP, and client portals<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cloud consoles (AWS, Azure, GCP)<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Remote access, VPN, and privileged admin tools<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">For internet-facing systems and SaaS, close common gaps with stricter<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/cloud-security-is-your-business-data-truly-safe\/\"> <span style=\"font-weight: 400\">cloud security<\/span><\/a><span style=\"font-weight: 400\"> controls and conditional access. Then, reduce blast radius: segment admin accounts, disable legacy auth, and issue just-in-time privileges for elevated work.<\/span><\/p>\n<h2><b>Step 4: Eliminate the \u201cEasy Way In\u201d<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Attackers rarely brute force; they trick people or exploit convenience. Remove the common shortcuts.<\/span><\/p>\n<h3><b>Shut down these risks:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><b>Email forwarding rules<\/b><span style=\"font-weight: 400\"> that redirect invoices or approvals.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Password reuse<\/b><span style=\"font-weight: 400\"> between personal and business sites.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Saved browser passwords<\/b><span style=\"font-weight: 400\"> on unmanaged devices.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Public hotspots<\/b><span style=\"font-weight: 400\">\u00a0 require VPN and coach users on<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/the-hidden-risks-of-public-wi-fi-and-how-to-protect-your-data\/\"> <span style=\"font-weight: 400\">public Wi-Fi<\/span><\/a><span style=\"font-weight: 400\"> risks.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Shared logins<\/b><span style=\"font-weight: 400\"> for apps without user licensing use shared vaults with approvals.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">If an incident slips through, your team should know the playbook: revoke sessions, reset credentials, rotate API keys, and validate backups. Speaking of which, verify your<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/data-backup-and-disaster-recovery-protecting-your-business-from-the-unexpected\/\"> <span style=\"font-weight: 400\">data backup<\/span><\/a><span style=\"font-weight: 400\"> can actually restore business-critical apps quickly.<\/span><\/p>\n<h2><b>Step 5: Make Security the Fastest Path to Getting Work Done<\/b><\/h2>\n<p><span style=\"font-weight: 400\">People take shortcuts when security slows them down. Flip the script: make the secure path the easiest path.<\/span><\/p>\n<h3><b>Do this to reduce friction:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enable passkeys or FIDO2 keys where available fewer prompts, stronger auth.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use SSO for sanctioned apps; hide or block unsanctioned ones.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Allow \u201capproved device = fewer prompts\u201d while keeping strong posture.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Set smart session lifetimes (short for admin, longer for low-risk tools).<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Publish a \u201chow-to\u201d hub with 60-second guides and short videos.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Back it up with continuous coaching, not once-a-year lectures. Modern learning tools keep password hygiene top-of-mind alongside other<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/essential-cybersecurity-practices-every-business-must-implement-in-2025\/\"> <span style=\"font-weight: 400\">cybersecurity<\/span><\/a><span style=\"font-weight: 400\"> basics.<\/span><\/p>\n<h2><b>Step 6: Prove It with Metrics That Matter to the Business<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Executives don\u2019t want another dashboard; they want outcomes. Track the signals that correlate with risk and productivity.<\/span><\/p>\n<h3><b>KPIs worth watching:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">% of accounts with MFA enabled<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">% of unique passwords across business apps<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Mean time to revoke access after offboarding<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Exposed credential alerts closed within SLA<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Phishing report rate vs. click rate<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Recovery time objectives met during drills<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Tie these outcomes to dollars. Reducing successful phish or credential reuse lowers<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/the-cost-of-it-downtime-why-small-businesses-must-prioritize-prevention\/\"> <span style=\"font-weight: 400\">downtime cost<\/span><\/a><span style=\"font-weight: 400\">, regulatory exposure, and support tickets clear business wins.<\/span><\/p>\n<p><a href=\"https:\/\/youtu.be\/bNBMTl-MnNE\"><img decoding=\"async\" class=\"aligncenter wp-image-3212 \" src=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-video-template-1-1024x576.png\" alt=\"\" width=\"754\" height=\"424\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-video-template-1-1024x576.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-video-template-1-300x169.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-video-template-1-768x432.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2025\/10\/Copy-of-video-template-1.png 1280w\" sizes=\"(max-width: 754px) 100vw, 754px\" \/><\/a><\/p>\n<h2><b>Step 7: Bake Passwords into a Layered Defense<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Passwords are your first gate, not your only gate. Build depth so a single failure doesn\u2019t become a breach.<\/span><\/p>\n<h3><b>Layered controls to add:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><b>Advanced email filtering<\/b><span style=\"font-weight: 400\"> plus user reporting workflows.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Conditional access<\/b><span style=\"font-weight: 400\"> and device posture checks for cloud apps.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>EDR\/XDR<\/b><span style=\"font-weight: 400\"> for credential theft and token hijacking detection.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Privileged access management<\/b><span style=\"font-weight: 400\"> for break-glass and admin accounts.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Immutable backups<\/b><span style=\"font-weight: 400\"> and tested recovery for ransomware resilience.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Regulated environments should align with policy frameworks and document enforcement. Partnering for ongoing<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/compliance-and-cybersecurity-how-small-businesses-can-avoid-costly-fines\/\"> <span style=\"font-weight: 400\">compliance<\/span><\/a><span style=\"font-weight: 400\"> support keeps audits predictable and reduces last-minute scrambles.<\/span><\/p>\n<h2><b>Quick Wins You Can Ship This Month<\/b><\/h2>\n<p><span style=\"font-weight: 400\">If you only have a few hours, ship the changes that deliver the biggest risk drop per minute:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Turn on MFA for email and finance platforms (enforce, don\u2019t \u201cencourage\u201d).<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Roll out a password manager to a pilot group (Finance + Leadership).<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Block weak and breached passwords via your identity provider.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Disable legacy authentication and enforce modern OAuth.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Create a one-page \u201cTravel Mode\u201d with VPN and hotspot guidance.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Schedule a restore test to validate<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/how-managed-it-services-keep-small-businesses-running-smoothly\/\"> <span style=\"font-weight: 400\">managed services<\/span><\/a><span style=\"font-weight: 400\"> backup recovery steps.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<h2><b>When to Call for Backup (Not the Tape Kind)<\/b><\/h2>\n<p><span style=\"font-weight: 400\">If you\u2019re juggling tool sprawl, frequent vendor changes, and limited staff cycles, a trusted partner can accelerate the roadmap while your team stays focused on revenue. Look for providers that combine security architecture, identity, and operations\u2014not just checklists. They should also help you prioritize cloud identity hygiene and misconfigurations\u2014common gaps called out in<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/cloud-security-is-your-business-data-truly-safe\/\"> <span style=\"font-weight: 400\">cloud security<\/span><\/a><span style=\"font-weight: 400\"> assessments.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For leaders building a broader modernization plan, align password hygiene with automation, monitoring, and user experience improvements so security boosts productivity. You\u2019ll find more ideas in these business-first reads on<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/work-smarter-not-harder-supercharge-your-teams-productivity-with-cutting-edge-it-tools\/\"> <span style=\"font-weight: 400\">productivity<\/span><\/a><span style=\"font-weight: 400\"> and resilient<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/cloud-confidence-why-every-business-needs-a-robust-cloud-strategy-for-success\/\"> <span style=\"font-weight: 400\">cloud strategy<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Passwords may feel like a small piece of your overall technology strategy, but they remain one of the most powerful shields your business has against cyber threats. By standardizing strong policies, deploying a trusted password manager, enabling multi-factor authentication, and reinforcing your defenses with layered security, you transform passwords from a daily frustration into a silent guardian of productivity and compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For SMB leaders, this isn\u2019t just about convenience\u00a0 it\u2019s about protecting revenue, safeguarding customer trust, and keeping operations running smoothly in an unpredictable digital landscape. Partnering with an experienced IT provider like<\/span><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/blog\/how-managed-it-services-keep-small-businesses-running-smoothly\/\"> <span style=\"font-weight: 400\">CMIT Solutions<\/span><\/a><span style=\"font-weight: 400\"> can help you integrate these best practices quickly and confidently, ensuring that secure password management becomes a growth enabler, not an ongoing headache.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-749\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-1024x341.png\" alt=\"\" width=\"1024\" height=\"341\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-1024x341.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-300x100.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-768x256.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3-1536x512.png 1536w, https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-content\/uploads\/sites\/29\/2024\/05\/Blue-Yellow-Promotion-Call-to-Action-Email-Header-3.png 1575w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your team is still juggling passwords on sticky notes, spreadsheets, or&#8230;<\/p>\n","protected":false},"author":331,"featured_media":3211,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[26,22,48,16,28,33,17,23,42,47],"class_list":["post-3210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-client-solution","tag-cmit-boston","tag-cmit-boston-newton-waltham","tag-cmit-solutions","tag-cost-savings","tag-customized-it","tag-cyber-security","tag-it-managed-services","tag-it-support-services","tag-tech-it-support"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/posts\/3210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/comments?post=3210"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/posts\/3210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/media\/3211"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/media?parent=3210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/categories?post=3210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1020\/wp-json\/wp\/v2\/tags?post=3210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}