Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
![]() |
|
![]() |
|
![]() |
|
![]() |
System File Checker is a great utility that is typically... Read More
The first step is: Start > My DocumentsSo you have... Read More
In the years of the dot com boom and bust,... Read More
We all enjoy our favorite screensavers but in the same... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
How long do you think DVDs have around? 20 years?... Read More
With renting methods such as online DVD rental and pay-per-view,... Read More
Simone is exasperated. She has to work on her university... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
Up until the recent past, those who wanted to take... Read More
It seems like fast never quite rates fast enough.No matter... Read More
Not so many years ago, homes across the country watched... Read More
Digital Video Disc or as it is sometimes referred to... Read More
The year is 1981. IBM has just released the Personal... Read More
Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More
If you've been kicking around the idea of building your... Read More
Tip #1. Do a Google search. Don't be to general... Read More
Google, in their march to stay ahead of the pack... Read More
Winter?the official start of the cold and flu season. Though,... Read More
How familiar does the following sound? Your computer was working... Read More
This is the third in a series of articles highlighting... Read More
All of us are familiar with the pyramids of Egypt.... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
Spyware is the software that collects information about your online... Read More
I recently took a good look at what was keeping... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
Enhanced Definition Television ? also known as EDTV ? is... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
I have a love-hate relationship with my computer.In fact, often... Read More
Projectors have come a long way in the past few... Read More
Having two operating systems is not as difficult as many... Read More
With the bewildering number of digital cameras on the market,... Read More
So I'll start from the very beginning.One day I was... Read More
The technological horizon has always got something new to offer,... Read More
With a little tweaking and with proper tools, you can... Read More
There are plenty of articles out there about how to... Read More
MP3 players are Hot! Playing music has come a long... Read More
Have you ever thought about building your own computer system?... Read More
This is not your typical lost data story. I was... Read More
So I'll start from the very beginning.One day I was... Read More
Each of the items in the checklist below is part... Read More
So you got yourself a digital camcorder. If you want... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
BIOS - Basic Input Output SystemThe central processing unit of... Read More
Upgrading your processor will always speed up your computer, but... Read More
Want to save money while promoting your web-based business? Of... Read More
As the web has evolved, so have the methods of... Read More
In Windows Xp, you can install two operating systems on... Read More
A computer needs a certain amount of information to operate;... Read More
MMC and SDFlash memory is available in so many formats... Read More
The Internet can be a dangerous place.While you're enjoying the... Read More
In the first part of this home lab tutorial, CCNA... Read More
All over the world, people carry with them walkmans and... Read More
For those seeking to buy their first flat panel TV... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
As the owner of a Country Mall and Top Site... Read More
Many computer users are worried about their computer's performance. After... Read More
Unless you place your faith in internal search engine software... Read More
For many people the computer industry is a seeming unsolvable... Read More
The first step is: Start > My DocumentsSo you have... Read More
Most of the web applications have a lot of images... Read More
If you utilize a computer at home or work it... Read More
Most people think that all you have to do to... Read More
Do you use Windows standard uninstall feature? How do you... Read More
Ad Blocking is getting to be a common sport on... Read More
As the Web grows more crowded and just plain "noisy"... Read More
Personal Technology |