Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
It's free, it comes with Windows and it's used by... Read More
Buying Your PCBuying a PC that's right for you and... Read More
Webmasters usually sit at their computers much longer in a... Read More
Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More
Freezing is also known as crashing or hanging. It's frustrating.... Read More
A Computer in Your HandCarrying around an address book and... Read More
With their solid-state technology, compact size, and abundant memory, portable... Read More
Not so many years ago, homes across the country watched... Read More
First and foremost before I begin my ranting it is... Read More
I recently got an e-mail asking about virtual memory. The... Read More
Digital cameras ratings are great tools for deciding which camera... Read More
I got my eyes set on a iPod mini, as... Read More
Sometimes your PC will start acting strange for no apparent... Read More
Save money. Save 10-15% on utility bills per month. Work... Read More
This is not your typical lost data story. I was... Read More
In my humble opinion nothing makes a long trip easier... Read More
Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More
Spyware is the software that collects information about your online... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
Your Bible At Your FingertipsIt is fairly easy to find... Read More
Windows Media Player 10 has been full of bugs from... Read More
IntroOne of the big advantages of PCs over earlier types... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
Time is money. And when you constantly have to divide... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
Up until the recent past, those who wanted to take... Read More
The United States Of America citizen feels that games is... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
You use Ctrl+Alt+Del to see what's running on your PC,... Read More
MP3 players are Hot! Playing music has come a long... Read More
We have just entered the time of year that most... Read More
Most people download and save so much information on their... Read More
Wouldn't you be shocked to find that your personal sensitive... Read More
This tip is on sharing files and folders on a... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
You have your television and home theater receiver; you just... Read More
There are soooo many choices. With all the styles and... Read More
"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More
One of the most common questions computer users ask is,... Read More
Not so many years ago, homes across the country watched... Read More
Here are some tips on how to use screensavers:First of... Read More
First and foremost before I begin my ranting it is... Read More
How long do you think DVDs have around? 20 years?... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
How familiar does the following sound? Your computer was working... Read More
Unless you place your faith in internal search engine software... Read More
I got my eyes set on a iPod mini, as... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
Buying Your PCBuying a PC that's right for you and... Read More
Tip #1. Do a Google search. Don't be to general... Read More
When I first started studying for my CCNP, some of... Read More
So I'll start from the very beginning.One day I was... Read More
In this era of Internet, most people are frequent users... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
A Computer in Your HandCarrying around an address book and... Read More
Digital Video Disc or as it is sometimes referred to... Read More
No matter how fast your processor and regardless of how... Read More
MP3 players are Hot! Playing music has come a long... Read More
For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More
Computer related terminology could sometimes be daunting to newcomers. These... Read More
If you are a building a website or a forum,... Read More
The United States Of America citizen feels that games is... Read More
In Windows Xp, you can install two operating systems on... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More
Digital cameras ratings are great tools for deciding which camera... Read More
Personal Technology |