Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
Wood Dale Chicago prom limo .. Lockport Chicago limo O’HareComputer related terminology could sometimes be daunting to newcomers. These... Read More
The basic language of the internet is html. If you... Read More
Understanding digital camera prices makes finding the best camera value... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
Save money. Save 10-15% on utility bills per month. Work... Read More
The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More
"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More
I do a holiday letter every year and send them... Read More
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More
Perhaps not yet, but the handwriting might be on the... Read More
Maybe you always wanted a feature that hasn't been available... Read More
Not so many years ago, homes across the country watched... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
So you've got some spyware, ad-ware, or viruses on your... Read More
Computer is an electronic machine work on the instructions of... Read More
Plenty! When we made the decision to be our own... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
We have just entered the time of year that most... Read More
Everywhere you look today people are listening to personal audio... Read More
We've all seen them, you've been browsing a website and... Read More
Nothing is worse than having to negotiate all kinds of... Read More
One of the most confusing parts of beginning your Cisco... Read More
The United States Of America citizen feels that games is... Read More
"Automated Testing" is automating the manual testing process currently in... Read More
Antigo wedding limo ..Plasma and LCD TVs are the latest trend in home... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
The following practice, if done regularly, may help you to... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
Surf the 'Net for about 10 minutes and chances rate... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Tip #1. Do a Google search. Don't be to general... Read More
When browsing the internet you are likely to come across... Read More
Are you frustrated with your PC?Is it feeling sluggish or... Read More
Here are some tips on how to use screensavers:First of... Read More
I met an entrepreneur who hole heartedly disagree with an... Read More
You don't have to fork out $250 for a super-diggy-whizbang... Read More
If you've been kicking around the idea of building your... Read More
iPod users start to get the picture and it's turning... Read More
First and foremost before I begin my ranting it is... Read More
For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More
In the years of the dot com boom and bust,... Read More
JVC developed and used a high-performance reflective film to produce... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
What led them to this choice, as all four studios... Read More
By using your computer today you can find a lot... Read More
Enhanced Definition Television ? also known as EDTV ? is... Read More
Buying a receiver is one of the most important decisions... Read More
When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More
If you don't have an mp3 player, and even if... Read More
Personal Technology |