Explain why an organization should establish and enforce policies for its IT systems in the following areas regarding the use of passwords for login:
Length of password.
The use of numbers or symbols in passwords.
Using common words or names as passwords.
Rotation of passwords.
Writing passwords on paper or sticky notes.