Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.

It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.

The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.

Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.

Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.

In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.

About The Author

Terrence F. Doheny

President, Beyond If Solutions,LLC

www.beyondifsolutions.com

www.beyondifsolutions.com

no-contract cleaning service Glencoe ...
In The News:

Facebook crypto scams trick users with fake celebrity endorsements and legitimate-looking cryptocurrency exchange ads that install malware on victims' devices.
Create private chat rooms using the iPhone Notes app collaboration feature with instant messaging capabilities and full control over conversation privacy.
Lyft rolled out safety upgrades with a new Safety Hub, driver blocking capability and a favorite driver option to give riders more control over their experience.
New research shows Americans increasingly trust AI for wellness guidance over social media, with 63% finding artificial intelligence reliable for health.
Luxury fashion brand Dior experienced a January 2025 data breach affecting customer personal information, and notifications were sent months after the discovery.
The commercial Unitree H1 humanoid robot weighs 104 pounds with 365 pound-feet torque per joint and demonstrates dangerous potential when software glitches occur.
Americans average 10-plus hours online daily, according to recent survey, splitting time between streaming shows on TV and browsing websites on multiple devices.
Boost your smartphone privacy instantly with these security tweaks for iPhone and Android that limit ad tracking, hide notifications and prevent unauthorized access.
Platforms like Hoax Tech and JS Click Cloaker help cybercriminals bypass detection systems using machine learning to selectively display scam content to victims.
A new battery recycling technique transforms old lithium-ion batteries into high-performance components that retain 88% capacity after 500 cycles with minimal waste.
Google's Android operating system can warn users about earthquakes before the shaking even begins – and there are ways to do it on your iPhone, too.
Meta's new gesture control wristband might just be the most seamless way to control a computer yet. And no, it doesn't require surgery, a camera, or even a touchscreen. All it needs is your wrist.
Long-haul trucks are now being upgraded with a surprising twist, thanks to California-based startup Revoy. Their electric boost doesn't replace diesel but works alongside it to cut emissions and fuel costs without major disruption.
PayPal and Venmo just rolled out something big: AI-powered scam alerts for Friends and Family payments.
As data centers multiply across the United States, energy demand is increasing at a rapid pace. This has not escaped the notice of large investment firms from Wall Street.
The Unicode Consortium, the nonprofit organization that maintains the Unicode Standard to ensure emojis work across devices, has announced Unicode 17.0, which includes nine new emojis slated for release this fall, in September 2025.
OpenAI is one of the world's leading AI research labs. Founded in 2015, it's behind some of today's most talked-about tools, including GPT, DALL·E, and ChatGPT.
Ever catch your dog staring at the screen during movie night and wonder if they're actually watching? Turns out, they might be. A new scientific study from Auburn University found that many dogs really do engage with television, and not all pups react the same way.
Stop the scammers from making contact in the first place. They're getting your parents' contact information and much more personal data besides, from somewhere.
The Walker S2 robot from UBTech autonomously exchanges its batteries in just three minutes, allowing continuous operation in car factories operated by BYD, Nio and Zeekr.
The FX Super One electric MPV from Faraday Future offers flexible seating, zero-gravity recliners and an AI system that creates a personal connection between driver and vehicle.
Practical solutions for reducing unwanted charity mail, political texts and email spam by opting out of shared lists, replying "STOP" and using data removal services.
Delta's new AI pricing system eliminates static airfares for personalized rates based on individual data, raising questions about fairness while promising optimized revenue.
AI data centers are straining the power grid across 13 states, contributing to a $9 billion increase in electricity costs, and PJM customers face monthly bill increases of $25 or more.
Artificial intelligence is transforming the music industry as AI-generated bands like The Velvet Sundown earn substantial streaming revenue, prompting lawsuits from major record labels.

What Exactly are Screensavers? - part II

Here are some tips on how to use screensavers:First of... Read More

How To Safeguard Your Computer?

The following practice, if done regularly, may help you to... Read More

Help, I Need a New HDTV! (Part 4 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Is DVD Storage An Attractive Alternative For Your Computer Backup?

If you have a computer for home use or for... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

Improve PC Performance - 6 Tips You Must Know

Are you frustrated with your PC?Is it feeling sluggish or... Read More

Best PC Pocket GPS

Stop Getting LostOne of the greatest uses for a pocket... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

Cisco CCNA Candidate FAQ

CCNA FAQQ. What exams do I have to take to... Read More

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

Cut Through the Hype and Make the Right Digital Camera Comparisons

There are soooo many choices. With all the styles and... Read More

How to Save an Image in a SQL Server Database?

Most of the web applications have a lot of images... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Why Build Your Own Computer System

Have you ever thought about building your own computer system?... Read More

How To Have Two (Multiple) Copies Of Windows

Having two operating systems is not as difficult as many... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

Compare MP3 Players for the Coolest Features and Sweetest Deals

How can you compare mp3 players to be sure you're... Read More

Cisco Certification: Taking Your First Certification Exam

You???ve studied hard; you???ve practiced your configurations; you???ve used your... Read More

Is Digital Camera Technology Making Film Obsolete?

Perhaps not yet, but the handwriting might be on the... Read More

Enhanced Web Browsing With Toolbars

As the Web grows more crowded and just plain "noisy"... Read More

4 Easy Ways to Speed Up A Sluggish PC

Computers are supposed to speed up our productivity?to help us... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

professional maid services Glenview ...