Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
executive chauffeured services Bradford .. Madison to Airport carA Computer in Your HandCarrying around an address book and... Read More
One of the most common questions computer users ask is,... Read More
How can you compare mp3 players to be sure you're... Read More
Are you looking for an MP3 player but am not... Read More
Tip #1 -- Rebates: A rebate is not always a... Read More
About mail-mergingMail-merging is the process of merging variable data and... Read More
For those seeking to buy their first flat panel TV... Read More
OK, so you caught a computer virus and your system... Read More
Computers are supposed to speed up our productivity?to help us... Read More
In my humble opinion nothing makes a long trip easier... Read More
Windows Media Player 10 has been full of bugs from... Read More
Has This Ever Happened To You? OK.. it's Friday night,... Read More
If you've been kicking around the idea of building your... Read More
If you're like me, you occasionally find the ubiquitous mouse... Read More
Maybe you always wanted a feature that hasn't been available... Read More
With the bewildering number of digital cameras on the market,... Read More
System File Checker is a great utility that is typically... Read More
Digital cameras ratings are great tools for deciding which camera... Read More
Tech support tells me to type 'regedt32' as opposed to... Read More
Spyware is the software that collects information about your online... Read More
Those small USB drives have so many names, pocket drives,... Read More
Buying a receiver is one of the most important decisions... Read More
If you're a computer expert, you'll probably already know about... Read More
Using SQL Server 2000 and above versions you can retrieve... Read More
After reading this good article you will know some important... Read More
O'Hare Chicago prom limo ..Up until the recent past, those who wanted to take... Read More
The battle is heating up for market share, home movie... Read More
Time is money. And when you constantly have to divide... Read More
ASR (Automated System Recovery) is a feature available on the... Read More
Tip #1. Do a Google search. Don't be to general... Read More
Your Bible At Your FingertipsIt is fairly easy to find... Read More
We've all seen them, you've been browsing a website and... Read More
The registry is where the computer stores information about the... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
If you utilize a computer at home or work it... Read More
About mail-mergingMail-merging is the process of merging variable data and... Read More
Get started creating web pages using text files and HTML... Read More
Selecting a TV isn't as easy as it used to... Read More
Spyware is the software that collects information about your online... Read More
For those seeking to buy their first flat panel TV... Read More
Do you remember the old saw about how computers would... Read More
System File Checker is a great utility that is typically... Read More
1. Let your PC boot up completely before opening any... Read More
Do you use Windows standard uninstall feature? How do you... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Plenty! When we made the decision to be our own... Read More
You probably heard of the new Firefox browser version 1.0... Read More
How long do you think DVDs have around? 20 years?... Read More
Flow Text Around a GraphicQuestion: I have inserted a photo... Read More
Not so many years ago, homes across the country watched... Read More
Personal Technology |