Personal Technology Information |
|
Passwords and the Human Factor
Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness. It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents. The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password. The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naďve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided. These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons. Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk. Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination. In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer. About The Author Terrence F. Doheny President, Beyond If Solutions,LLC
MORE RESOURCES: To Power Huge Data Centers, Utilities Are Turning to Fossil Fuels - Tech News Briefing - WSJ Podcasts The Wall Street Journal 100 Cool Tech Gadgets in 2024 BestProducts.com For Truly Envy-Inducing Vacation Pictures, Put the Phone Away The Wall Street Journal Why Turning It Off and Turning It Back On Is Gadget-Fixing Magic The Wall Street Journal In the City, Personal Safety Starts With Your Smartphone The Wall Street Journal A Potential TikTok Ban Is Looming. 5 Things to Know and How to Prepare - WSJ The Wall Street Journal Want to Get More Done? That Podcast in the Background Is Holding You Back The Wall Street Journal Tech That Will Change Your Life in 2024, From AI to EV - WSJ The Wall Street Journal After a Sugar High of Free Money, These Billion-Dollar Technologies Need a Nap The Wall Street Journal We Aren't Posting on Social Media as Much Anymore. Will We Ever? The Wall Street Journal The Tech to Help You Beat Your Tech Addictions The Wall Street Journal Tech Hubs Are Losing the Talent War to Everywhere Else The Wall Street Journal Best Tech Gifts of 2023 to Buy This Holiday Season, an Updated List - WSJ The Wall Street Journal The Invisible $1.52 Trillion Problem: Clunky Old Software The Wall Street Journal OpenAI Made AI Videos for Us. These Clips Are Good Enough to Freak Us Out. - WSJ The Wall Street Journal Don't rent out that container ship yet: CIOs and biz buyers view AI PCs with some caution The Register iPhone Fixes to Make if You're the Family IT Department This Year The Wall Street Journal I Bought the World's Hottest High-Tech E-Bike. Then Its Maker Went Bankrupt. The Wall Street Journal He Stole Hundreds of iPhones and Looted People's Life Savings. He Told Us How. The Wall Street Journal Vision Pro Review: Apple's First Headset Lacks Polish and Purpose The New York Times Hands Off! With $3500 Headsets in the Wild, New Social Norms Apply The Wall Street Journal The eight-bit Z80 is dead. Long live the 16-bit Z80! The Register Niklaus Wirth, Who Inspired a Generation of Computer Programmers, Dies at 89 The Wall Street Journal Yun-Hee Kim promoted to Tech Editor, Corporate and Personal Technology The Washington Post 'Hands were shaking': Google engineer details personal experience after tech gaint lays off employees, di The Times of India Boys Are Struggling. It Can Take Coaches, Tutors and Thousands a Month to Fix That. The Wall Street Journal Tesla decimates staff amid ongoing performance woe The Register Apple's New Face Computer Is for Work The Wall Street Journal Everything You Need to Know About Smartphone Backups The New York Times The Four Steps to Better Password Security - WSJ The Wall Street Journal Is the $139 Amazon Prime Subscription Still Worth It? The Wall Street Journal Turn On Your iPhone's Stolen Device Protection Now to Secure Your Money and Photos in iOS 17.3 Update - WSJ The Wall Street Journal The most personal technology | Jul 22nd 2023 The Economist Testing Apple’s Vision Pro The New York Times The Apple Video Feature Awkwardly Crashing Your Meetings - WSJ The Wall Street Journal A Pain-Free Way to Secure All Your Online Accounts The Wall Street Journal Yes, It's Rude to Use Your Laptop During Meetings—and More Tech Etiquette Rules You Might Be Breaking The Wall Street Journal This Artificially Intelligent Pin Wants to Free You From Your Phone The New York Times What if You Never Had to Charge Your Gadgets Again? The Wall Street Journal Meta’s Ray-Ban Smart Glasses Use AI to See, Hear and Speak. What Are They Like? The New York Times Novelty flip phone strips out almost every feature possible to be as boring as possible The Register The Youths Have Spoken: Wallets Are Uncool. Go Digital. The New York Times The Most Important Tech Company You've Never Heard of Is a Major Reason Computers Keep Getting Faster The Wall Street Journal Sluggish Wi-Fi? Weird Party Smells? 8 High-Tech Helpers for Harried Holiday Hosts The Wall Street Journal The Accounting Technology Lab Podcast: Personal Tech at CES 2024 CPAPracticeAdvisor.com Apple's iOS 17.3 Stolen Device Protection Update Aims to Stop iPhone Thieves - WSJ The Wall Street Journal Meta Welcomes Headset War With Apple - WSJ The Wall Street Journal Quick Tips to Save Time on the Telephone The New York Times Faster, Beefier, Cheaper: The Next-Generation Electric Skateboards Have Arrived The Wall Street Journal Want to Invest in SpaceX or Stripe? There's a Fund for That. The New York Times Things to Do: Our 12 Top Tech Tips of 2023 The Wall Street Journal You Spend Hours a Day in Your Browser. Now Make It Better. The Wall Street Journal Why Tech Companies Are Not Your Friends: Lessons From Roku The New York Times Is This the End of 'Intel Inside'? The Wall Street Journal One Month With Apple Vision Pro: In the Air, on a Train and…in a Drawer The Wall Street Journal Rage-Poking and Wet Fingers: Why Some Gadgets Need More Buttons The Wall Street Journal How to Make Your Phone Last Forever: 6 Simple Tips The Wall Street Journal Snapchat's Friend-Ranking Feature Adds to Teen Anxiety The Wall Street Journal |
RELATED ARTICLES
SmartCar Memory Stick for LapTop Transfer Data With the new technology used to transfer information to from your digital camera to your laptop or PC using memory sticks which hold significant amounts of data it appears such technology will be perfect for net-centric cars. Where all the data is stored in a black box situation as many cars now have these features already. Why Get a Microsoft MCSE Certification? In the years of the dot com boom and bust, the Microsoft MCSE Certification has gotten its eye blackened over an over. Paper Microsoft MCSE's who were excellent at finding brain dumps and passing exams gave the Microsoft MCSE Certification a bad name. What Exactly are Screensavers? - part II Here are some tips on how to use screensavers:First of all you should be careful when you use a screensaver on a LCD. A pixel it's on when it's dark on a LCD. HTML Explained: Part 1 Want to save money while promoting your web-based business? Of course you do. Here's some advice on the matter, from a freelance copywriter who knows: it pays to learn the basics of HTML. Computer Performance Tips IntroductionIn this article I will clearly spell out the most effective steps you can take in order to increase the performance of your computer and enhance your computing experience.More Memory (RAM)If your computer has less then 256 MB of memory you may want to consider adding more. Password Nightmares Good Morning Mr. Sampson. How To Search Your PC With Google Desktop In this era of Internet, most people are frequent users of computers. Many of us use computers through out the day, accumulating morasses of information in various formats, which include email, digital photo, word document, spreadsheet, presentation file, ebook, article, other downloaded files, music, visited web pages, and many others. Digital Cameras + Photo Printers = Quality Instant Photographs In the 1950's and 1960's Polaroid's instant cameras were all the rage. You could shoot a picture and have the finished print in a minute or so. Temporary Fixes to Spyware, Ad-ware, and Virus Infections So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner. Home Video? Bring it On So you got yourself a digital camcorder. If you want to be able to edit and produce awesome home videos, you'll need some tools. Email Management If you utilize a computer at home or work it is likely that you use email. Email is an electronic message that is sent from one computer to another following a specific protocol (Simple Mail Transfer Protocol or SMTP). Gain Control Over Your Screensavers With These Simple Steps We all enjoy our favorite screensavers but in the same time we all hate to see that they sometimes disturb our movies, presentations and all the things we do and do not like to be disturbed from. Just read carefully this article and you will never have this problem again. Palm PC critique I met an entrepreneur who hole heartedly disagree with an article in Advertising Age by Bradley Johnson that Palm Pilot can keep their market share through brand name. We discussed RIMM Research in Motion and my stock in that company and I defended the wireless venue, but he went into a tirade, luckily I used a digital recorder and got most of it; basically here is his critique:"That grip has already eroded by Palm PC makers and clones. Plasma TV vs LCD TV For those seeking to buy their first flat panel TVdisplay device, it is easy to be confused with conflicting and counter claims bydifferent interest parties. So what is the truth in the competition between LCDand Plasma TV? Here's are some pointers before you rush out and buy your flatpanel TV on impulse . Virtual Memory - What is It? I recently got an e-mail asking about virtual memory. The person who sent me the question was getting an error on random occasions from their Windows operating system stating "Your computer is low on virtual memory". Review of Rio MP3 Players Below you will find some useful information and comments about a few of the most popular MP3 players by Rio, including the Nitrus, Carbon, Cali, and Forge. None of these MP3 players are perfect, but each offers a unique set of strengths and weaknesses that should be taken into consideration before you purchase any one of them. EDTV vs HDTV Confused by EDTV vs HDTV? We don't blame you. The number of acronyms floating about with regard to digital TV is frightening. 5 Steps to Remove Spyware for Free Have you ever tried to remove Spyware off your PC only tofind out it never left or it came back? Tired of all thoseannoying Popups, Viruses, and Ads on your system day in andday out? Well, listen closely because the day has come toremove Spyware programs and Viruses - forever!I will give you some very useful tricks and tips to removeSpyware and Viruses for good! Follow closely:Steps to Remove Spyware, Viruses, and Adware1. There are many types of software available today thatclaim to remove spyware off our system, but which one REALLYdoes the job? What you need is software that not only willremove spyware, but TOTALLY removes it for good and keeps itoff. Are You Well Protected? Winter?the official start of the cold and flu season. Though, technically speaking, things got started a little early. How To Speed Up Your Aging PC And Make It Healthier Too With a little tweaking and with proper tools, you can get a faster, healthier PC, virtually immune to spyware infections and browser hijackers. How is this possible? Find out about the latest tools and how they work. |
home | site map |
© 2006 |