Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
limousine airport Glendale Heights .. Lockport Chicago limo O’HareStop Getting LostOne of the greatest uses for a pocket... Read More
There are plenty of articles out there about how to... Read More
Are you stymied by the vast offerings in cheap mp3... Read More
Buying Your PCBuying a PC that's right for you and... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
Cookies, not the kind that Mom makes, but the computer... Read More
Plenty! When we made the decision to be our own... Read More
Windows Media Player 10 has been full of bugs from... Read More
iPod users start to get the picture and it's turning... Read More
Spyware is the software that collects information about your online... Read More
Simone is exasperated. She has to work on her university... Read More
You use Ctrl+Alt+Del to see what's running on your PC,... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
This article describes the basic properties of color, what the... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
This tip is on sharing files and folders on a... Read More
Computers are available in different shapes, sizes and weights, due... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
Using SQL Server 2000 and above versions you can retrieve... Read More
World War II - Germany decided to attack Poland. Poland... Read More
It seems like fast never quite rates fast enough.No matter... Read More
When I first started studying for my CCNP, some of... Read More
One of the most common questions computer users ask is,... Read More
I do a holiday letter every year and send them... Read More
Lincoln Stretch rentals Willowbrook ..Your first step in removing dangerous infections from your computer... Read More
Stimulus thru Caffiene or Visual Input?It appears that the Mobi... Read More
The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More
MMC and SDFlash memory is available in so many formats... Read More
Simone is exasperated. She has to work on her university... Read More
You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More
Tip #1 -- Rebates: A rebate is not always a... Read More
This tip is on sharing files and folders on a... Read More
In Windows Xp, you can install two operating systems on... Read More
Music lovers have been carrying around radios and other bulky... Read More
By using your computer today you can find a lot... Read More
You don't have to fork out $250 for a super-diggy-whizbang... Read More
Webmasters usually sit at their computers much longer in a... Read More
Most people think that all you have to do to... Read More
Want to save money while promoting your web-based business? Of... Read More
In the early days, Personal Digital Assistants (PDAs) were not... Read More
MP3 players are Hot! Playing music has come a long... Read More
Viruses, software failures, power failures, human errors, hard drive failures... Read More
You have your television and home theater receiver; you just... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Passwords have a strange dual nature. The stronger and safer... Read More
When I first started studying for my CCNP, some of... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
Google, in their march to stay ahead of the pack... Read More
Are you stymied by the vast offerings in cheap mp3... Read More
Personal Technology |