FAQ: What are some user security best practices?
Maintaining security is a shared responsibility. Here are some best practices all Zudello users should follow:
-
Strong Passwords:
- If using password login (not SSO), create a strong, unique password for Zudello. Don't reuse passwords from other sites.
- Use a combination of upper/lowercase letters, numbers, and symbols.
- Consider using a password manager to generate and store complex passwords securely.
- Change your password immediately if you suspect it might have been compromised. See Resetting Your Password.
-
Two-Factor Authentication (2FA/MFA):
- If your organisation enables 2FA/MFA (either via Zudello settings or your SSO provider like Microsoft Entra ID), always use it. It adds a critical layer of security beyond just your password.
-
Log Out: Log out of Zudello when you finish your session, especially on shared or public computers.
-
Beware of Phishing:
- Be cautious of emails or messages asking for your Zudello login details. Zudello will never ask for your password via email.
- Verify the sender address and website URLs before clicking links or entering credentials. Zudello login pages are typically on
zudello.io
orzudello.com
domains. - Report suspicious emails to your IT department or Zudello support.
-
Secure Devices: Ensure the computer or mobile device you use to access Zudello has up-to-date antivirus software and operating system security patches. Avoid accessing Zudello from untrusted public Wi-Fi networks without a VPN.
-
Permissions Awareness: Understand the permissions associated with your role. Don't attempt actions you aren't authorised for. Report any unexpected access capabilities to your administrator.
-
Delegation Management: If you delegate your approvals, ensure you delegate to a trusted colleague and set appropriate end dates. Remove delegations promptly when no longer needed. See Setting Up Approval Delegation.
-
Report Suspicious Activity: If you notice any unusual activity on your account or suspect unauthorised access, report it immediately to your organisation administrator and/or Zudello support.
Following these practices helps protect your account and your organisation's sensitive financial data within Zudello.
title: What are some user security best practices? description: Recommendations for users to maintain security when using Zudello. slug: /faq/general/security-best-practices sidebar_label: What are user security best practices?
FAQ: What are some user security best practices?
Maintaining security is a shared responsibility. Here are some best practices all Zudello users should follow:
-
Strong Passwords:
- If using password login (not SSO), create a strong, unique password for Zudello. Don't reuse passwords from other sites.
- Use a combination of upper/lowercase letters, numbers, and symbols.
- Consider using a password manager to generate and store complex passwords securely.
- Change your password immediately if you suspect it might have been compromised. See Resetting Your Password.
-
Two-Factor Authentication (2FA/MFA):
- If your organisation enables 2FA/MFA (either via Zudello settings or your SSO provider like Microsoft Entra ID), always use it. It adds a critical layer of security beyond just your password.
-
Log Out: Log out of Zudello when you finish your session, especially on shared or public computers.
-
Beware of Phishing:
- Be cautious of emails or messages asking for your Zudello login details. Zudello will never ask for your password via email.
- Verify the sender address and website URLs before clicking links or entering credentials. Zudello login pages are typically on
zudello.io
orzudello.com
domains. - Report suspicious emails to your IT department or Zudello support.
-
Secure Devices: Ensure the computer or mobile device you use to access Zudello has up-to-date antivirus software and operating system security patches. Avoid accessing Zudello from untrusted public Wi-Fi networks without a VPN.
-
Permissions Awareness: Understand the permissions associated with your role. Don't attempt actions you aren't authorised for. Report any unexpected access capabilities to your administrator.
-
Delegation Management: If you delegate your approvals, ensure you delegate to a trusted colleague and set appropriate end dates. Remove delegations promptly when no longer needed. See Setting Up Approval Delegation.
-
Report Suspicious Activity: If you notice any unusual activity on your account or suspect unauthorised access, report it immediately to your organisation administrator and/or Zudello support.
Following these practices helps protect your account and your organisation's sensitive financial data within Zudello.