Project Study: Complex Passwords
Minimize business impact and reduce technical support requirements
Results
- Business impact was minimized when less than 1% of calls to Service Desk were escalated above level 1
Situation
- Not all business units were enforcing the policy for complex passwords uniformly; most notable gaps in enforcement were among iOS mobile devices (iPads and iPhones) mostly concentrated among senior leaders
- Over 500 individuals with a total of 800 devices were impacted by an InfoSec technology change enforcing complex passwords
- In addition to the top 20% of leaders who received personal concierge support, over 10% of the remaining population called Service Desk, preferring to be walked through the instructions rather than reading on their own
Project Right-Sizing
- A well-prepared Service Desk empowered by accurate, highly customized documentation completely satisfied all questions. Only one call was escalated to level 2 support
- This and other InfoSec initiatives cross-referenced each other so employees at all levels could see the bigger picture

More Project Studies
Why plan Return on Investment (ROI) before completing design and deployment?
Experience shows that focusing on Level 3+ results from the outset yields a much more powerful outcome while also making the project easier and less risky.
How to make your data classification project easier
Leverage our lessons learned to make your project easier using the SecuriThink Data Classification Complexity Scale.
Data Classification – Example 1
Rally C-suite ownership with a compelling business case for change
Data Classification – Example 2
Managing across the enterprise for new security habits
Data Classification – Example 3
Quick Start the project, cross-train client team, manage risk
Secure the Perimeter
23 Workstreams over 2 years deployed many technologies and policy changes in support of a “Defense In Depth” InfoSec strategy
Better Phishing Protection
Behavior change and more leverage from Security Education and Awareness (SEA)
Administrative Rights
Reduce technical support with appropriate employee engagement
Managing Across the Supply Chain
High security computer-based test centers