Maintain your old Siemens Hipath system

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.

It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.

The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.

Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.

Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.

In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.

About The Author

Terrence F. Doheny

President, Beyond If Solutions,LLC

www.beyondifsolutions.com

terry@beyondifsolutions.com

In The News:

Parents and son, 7, killed in Genoa bridge collapse
Wed, 15 Aug 2018 10:00:00 +0100
A family of three who were driving to Sardinia for a holiday were reportedly among those killed in a bridge collapse in Genoa, Italy.

Munich attack widow: Corbyn must apologise
Tue, 14 Aug 2018 22:31:00 +0100
The widow of one of the victims of the Munich Olympics terror attack has accused Jeremy Corbyn of hypocrisy and has demanded he apologise.

Child abuse by hundreds of priests covered up
Tue, 14 Aug 2018 23:54:00 +0100
The abuse of more than 1,000 children for decades by hundreds of priests was systemically covered up by church officials, , according to a report.

Face transplant gives hope after suicide attempt
Wed, 15 Aug 2018 04:04:00 +0100
A 21-year-old woman who tried to take her own life by shooting herself in the face has become the youngest person in the United States to receive a face transplant.

Stolen Buddha bronze to be returned to India
Wed, 15 Aug 2018 05:20:00 +0100
An ancient bronze statue of Buddha, stolen from an Indian museum 60 years ago is to be returned to the country after being spotted at a London antiques fair.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Buying A PC Flat Screen Monitor

For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More

5 Ways to Speed Up Your PC

No matter how fast your processor and regardless of how... Read More

Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment

MP3 players are Hot! Playing music has come a long... Read More

Apache, MySQL & PHP for Windows

Apache, MysQL and PHP for Windows could be a nice... Read More

Why Build Your Own Computer System

Have you ever thought about building your own computer system?... Read More

The Advantages of Portable MP3 Players

With their solid-state technology, compact size, and abundant memory, portable... Read More

Bluetooth Technology: Tips for Buying Headsets or Headphones

The technological horizon has always got something new to offer,... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

How To Buy An MP3 Player

Are you looking for an MP3 player but am not... Read More

Computer Geeks and Garden Gnomes

First and foremost before I begin my ranting it is... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

What?s the Difference Between Plasma TVs and LCD TVs?

Plasma and LCD TVs are the latest trend in home... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer... Read More

Are You Putting Off Productivity?

I recently took a good look at what was keeping... Read More

Help, I Need a New HDTV! (Part 5 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Faster Browsing Tips

IF WE say that it was mainly because of the... Read More

Be Prepared in the Event Computer Disaster Strikes

ComputersBusinesses and individuals alike have all grown to rely on... Read More

Quick System Restore with ASR Backups

ASR (Automated System Recovery) is a feature available on the... Read More

The Benefits of Open Source

If you are a building a website or a forum,... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More