Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
Rolling Meadows Cadillac Escalade rental .. Lockport Chicago limo O’HareFeeling overwhelmed in selecting a new TV? With all the... Read More
Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More
As the web has evolved, so have the methods of... Read More
Want to save money while promoting your web-based business? Of... Read More
Have you ever tried to remove Spyware off your PC... Read More
You don't have to fork out $250 for a super-diggy-whizbang... Read More
Ad Blocking is getting to be a common sport on... Read More
After another security hole recently surfaced in Microsoft's Windows operating... Read More
The first step is: Start > My DocumentsSo you have... Read More
Digital cameras ratings are great tools for deciding which camera... Read More
Projectors have come a long way in the past few... Read More
With a little tweaking and with proper tools, you can... Read More
Nothing is worse than having to negotiate all kinds of... Read More
Webmasters usually sit at their computers much longer in a... Read More
Buying a receiver is one of the most important decisions... Read More
That desk in front of you and everything else around... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
Each of the items in the checklist below is part... Read More
All over the world, people carry with them walkmans and... Read More
Upgrading your processor will always speed up your computer, but... Read More
I've worked my way from the CCNA to the CCIE,... Read More
There have been some questions on anti-skip protection on mp3... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
Des Moines rental limo ..You use Ctrl+Alt+Del to see what's running on your PC,... Read More
With renting methods such as online DVD rental and pay-per-view,... Read More
There are many sources of heat that can raise the... Read More
GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More
"Automated Testing" is automating the manual testing process currently in... Read More
Get started creating web pages using text files and HTML... Read More
The registry is where the computer stores information about the... Read More
What led them to this choice, as all four studios... Read More
It seems like fast never quite rates fast enough.No matter... Read More
BIOS - Basic Input Output SystemThe central processing unit of... Read More
We have just entered the time of year that most... Read More
Not so many years ago, homes across the country watched... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
As the owner of a Country Mall and Top Site... Read More
The year is 1981. IBM has just released the Personal... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
Computers are available in different shapes, sizes and weights, due... Read More
For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More
We all enjoy our favorite screensavers but in the same... Read More
Those small USB drives have so many names, pocket drives,... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
In this era of Internet, most people are frequent users... Read More
In my humble opinion nothing makes a long trip easier... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
This is the third in a series of articles highlighting... Read More
Personal Technology |