Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
Batchtown Chicago prom limo .. Lockport Chicago limo O’HareHere are some tips on how to use screensavers:First of... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Saving Lives With A Pocket PCFree medical downloads can be... Read More
Viruses, software failures, power failures, human errors, hard drive failures... Read More
A computer needs a certain amount of information to operate;... Read More
As the owner of a Country Mall and Top Site... Read More
I've worked my way from the CCNA to the CCIE,... Read More
So you got yourself a digital camcorder. If you want... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
Computers are available in different shapes, sizes and weights, due... Read More
All over the world, people carry with them walkmans and... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Apache, MysQL and PHP for Windows could be a nice... Read More
Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More
I would like to tell you about a magic home.... Read More
When browsing the internet you are likely to come across... Read More
Unless you place your faith in internal search engine software... Read More
I am going to assume that you are running windows... Read More
Surf the 'Net for about 10 minutes and chances rate... Read More
A friend told me: "My computer startup seems to be... Read More
Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More
1. Let your PC boot up completely before opening any... Read More
It's free, it comes with Windows and it's used by... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
The technological horizon has always got something new to offer,... Read More
shuttle from Midway Munster are ..Buying Your PCBuying a PC that's right for you and... Read More
Each of the items in the checklist below is part... Read More
This tip is on sharing files and folders on a... Read More
Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More
In my humble opinion nothing makes a long trip easier... Read More
As the Web grows more crowded and just plain "noisy"... Read More
I met an entrepreneur who hole heartedly disagree with an... Read More
Ad Blocking is getting to be a common sport on... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
Here are some tips on how to use screensavers:First of... Read More
I am going to assume that you are running windows... Read More
BIOS - Basic Input Output SystemThe central processing unit of... Read More
Maybe you always wanted a feature that hasn't been available... Read More
I recently took a good look at what was keeping... Read More
Viruses, software failures, power failures, human errors, hard drive failures... Read More
If you use a computer, you need to know more... Read More
MP3 players are Hot! Playing music has come a long... Read More
Getting a new computer should be an exciting and gratifying... Read More
Music lovers have been carrying around radios and other bulky... Read More
It's hard enough as it is these days to get... Read More
How can you compare mp3 players to be sure you're... Read More
Winter?the official start of the cold and flu season. Though,... Read More
I recently got an e-mail asking about virtual memory. The... Read More
You???ve studied hard; you???ve practiced your configurations; you???ve used your... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Personal Technology |