Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
no-contract cleaning service Glencoe ...Here are some tips on how to use screensavers:First of... Read More
The following practice, if done regularly, may help you to... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
If you have a computer for home use or for... Read More
Tech support tells me to type 'regedt32' as opposed to... Read More
Are you frustrated with your PC?Is it feeling sluggish or... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
I do a holiday letter every year and send them... Read More
Using SQL Server 2000 and above versions you can retrieve... Read More
1. Before sitting down for coding, you must have formal... Read More
CCNA FAQQ. What exams do I have to take to... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
Google, in their march to stay ahead of the pack... Read More
There are soooo many choices. With all the styles and... Read More
Most of the web applications have a lot of images... Read More
When I first started studying for my CCNP, some of... Read More
Have you ever thought about building your own computer system?... Read More
Having two operating systems is not as difficult as many... Read More
Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More
How can you compare mp3 players to be sure you're... Read More
You???ve studied hard; you???ve practiced your configurations; you???ve used your... Read More
Perhaps not yet, but the handwriting might be on the... Read More
As the Web grows more crowded and just plain "noisy"... Read More
Computers are supposed to speed up our productivity?to help us... Read More
The battle is heating up for market share, home movie... Read More
professional maid services Glenview ...The DNS (Domain Name System) servers are what your computer... Read More
Since the DOS days, batch files have been one of... Read More
JVC developed and used a high-performance reflective film to produce... Read More
If you ask most people what frustrates them most about... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
You have your television and home theater receiver; you just... Read More
Maintaining your computer is extremely important ? especially if you... Read More
I got my eyes set on a iPod mini, as... Read More
Many computer users are worried about their computer's performance. After... Read More
Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More
The first step is: Start > My DocumentsSo you have... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
IntroOne of the big advantages of PCs over earlier types... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
Buying Your PCBuying a PC that's right for you and... Read More
If you utilize a computer at home or work it... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
Tip #1. Do a Google search. Don't be to general... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
Do you remember the old saw about how computers would... Read More
System File Checker is a great utility that is typically... Read More
"Automated Testing" is automating the manual testing process currently in... Read More
When browsing the internet you are likely to come across... Read More
Upgrading your processor will always speed up your computer, but... Read More
There are soooo many choices. With all the styles and... Read More
Personal Technology |