Maintain your old Siemens Hipath system

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.

It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.

The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.

Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.

Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.

In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.

About The Author

Terrence F. Doheny

President, Beyond If Solutions,LLC

www.beyondifsolutions.com

terry@beyondifsolutions.com

In The News:

Leaders embrace at surprise Korean summit
Sat, 26 May 2018 12:32:00 +0100
North Korean leader Kim Jong Un has met South Korean President Moon Jae-in for the second time in a month - with the pair sharing an embrace.

'A quiet revolution': Ban on abortions set to end
Fri, 25 May 2018 22:11:00 +0100
The result in Ireland's historic referendum on relaxing abortion laws appears to have been a "resounding" yes, the country's prime minister says.

Ireland witnesses a second uprising
Sat, 26 May 2018 02:07:00 +0100
"All changed, changed utterly," wrote the Irish poet William Butler Yates. He was referring to the aftermath of the Easter Rising over British rule in 1916.

Fears for girl, 13, who left UK on Eurotunnel train
Sat, 26 May 2018 14:52:00 +0100
Police say they are concerned for the welfare of a 13-year-old girl who has gone missing after leaving the UK.

Platini vows comeback after 'nightmare' investigation
Sat, 26 May 2018 11:31:00 +0100
Michel Platini has vowed to return to football after Swiss prosecutors said no evidence has been found "so far" in their investigation into possible financial wrongdoing.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Freezing - Time To Warm Up Your PC

Freezing is also known as crashing or hanging. It's frustrating.... Read More

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

What Has A Portable MP3 Player Have To Do With Your Business

Plenty! When we made the decision to be our own... Read More

Spyware Remover

Your first step in removing dangerous infections from your computer... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

404 Error Pages: What Are They And How Do You Create One?

We've all seen them, you've been browsing a website and... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

SmartCar Memory Stick for LapTop Transfer Data

With the new technology used to transfer information to from... Read More

Cisco Certification: The Most Important Cisco Study Youll Ever Do

All of us are familiar with the pyramids of Egypt.... Read More

5 Steps to Remove Spyware for Free

Have you ever tried to remove Spyware off your PC... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

Tips For Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

Palm PC critique

I met an entrepreneur who hole heartedly disagree with an... Read More

Lives With Games Tradition and Industry

The United States Of America citizen feels that games is... Read More

Your Home is in Your Hands

I would like to tell you about a magic home.... Read More

How To Buy An MP3 Player

Are you looking for an MP3 player but am not... Read More

Some Thoughts on Choosing a Flash MP3 Player

Flash mp3 players come with an exciting array of features,... Read More

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

Build Your Own Computer

I'm eighty-one years old and I bought my first computer... Read More

Taking Advantage of the iPod Experience

Music lovers have been carrying around radios and other bulky... Read More

Digital Cameras: How Many Pixels Do I Need?

With the bewildering number of digital cameras on the market,... Read More

USB Drives - What to Look For in a USB Device

Those small USB drives have so many names, pocket drives,... Read More

Is Digital Camera Technology Making Film Obsolete?

Perhaps not yet, but the handwriting might be on the... Read More