![]() | |
![]() | |
![]() |
Personal Technology Information |
|
![]() |
Passwords and the Human Factor
Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness. It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents. The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password. The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided. These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons. Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk. Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination. In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer. About The Author Terrence F. Doheny President, Beyond If Solutions,LLC
MORE RESOURCES: I Quit Google Search for AI—and I’m Not Going Back The Wall Street Journal If TikTok Is Here to Stay, What Does That Mean for Us? The New York Times TOP 10 personal tech and gadgets of 2024 Designboom The Latest Personal Tech at CES 2025- The Accounting Technology Lab Podcast - Jan. 2025 CPAPracticeAdvisor.com The Five Things You Shouldn’t Tell ChatGPT The Wall Street Journal Personal Enrichment Courses Wake Tech Newsroom Tech for Babies Is Booming. Here’s What One Parent Found Helped the Most. The New York Times Not a Coder? With A.I., Just Having an Idea Can Be Enough. The New York Times AI Solves My Most Annoying Chore: Meal Planning for a Toddler The Wall Street Journal How Workplace Tech Has Changed Over the Years, From the WSJ Archives The Wall Street Journal How Tech Created a ‘Recipe for Loneliness’ The New York Times iRobot may be iDead in iYear The Register Tech That Will Change Your Life in 2025 - WSJ The Wall Street Journal The Trouble With Searching Google for ‘the Best’ The Wall Street Journal The Snapchat Move That Leaves Teen Girls Heartbroken The Wall Street Journal When Cell Service Is Down, You Can Send iPhone Texts via Satellite The Wall Street Journal How to Create a Multimedia Digital Journal of Your Life The New York Times Office Technology Comes to the Movies: Test Your Knowledge With Our Quiz The Wall Street Journal Top 10 Personal Gadgets For Tech-Savvy Individuals Designed To Revolutionize Their Routine Yanko Design Your iPhone Storage Is Full Again. Do This to Reclaim Space. The Wall Street Journal How a Little-Known Finnish Company Became One of the World’s Hottest Gadget Startups - WSJ The Wall Street Journal Shop the best Cyber Monday deals on phones, tablets, smartwatches and more Good Morning America The 28 Best Tech Gifts of 2024, According to Our Gadget Gurus - WSJ The Wall Street Journal ChatGPT vs. Claude vs. DeepSeek: The Battle to Be My AI Work Assistant - WSJ The Wall Street Journal Tech Made Easy AARP Things to Try: Our 9 Top Tech Tips for You The Wall Street Journal Can You Turn Off Big Tech’s A.I. Tools? Sometimes, and Here’s How. The New York Times How to Make Typing Easier on the Phone and Leave the Laptop at Home The New York Times The Summer Is So Hot, Workers Are Wearing High-Tech Ice Packs The Wall Street Journal Touch Screens Are Over. Even Apple Is Bringing Back Buttons. - WSJ The Wall Street Journal Apple Intelligence Isn’t Very Smart Yet—and Apple’s OK With That - WSJ The Wall Street Journal I Replied ‘Stop’ to a Political Text Message. I Got 100 More. - WSJ The Wall Street Journal The Coolest Tech Gadgets We Recommend for 2025 BestProducts.com Wozniak: I didn't reduce chip count for manufacturing. I wanted to prove I was clever - The Register The Year Everyone Started ‘Manifesting.’ Does It Work? The Wall Street Journal Apple’s A.I. Is Landing Soon on iPhones. Here’s What It’s Like. The New York Times User said he did nothing that explained his dead PC – does a new motherboard count? - The Register What the Arrival of A.I. Phones and Computers Means for Our Data The New York Times Want an iPhone 16 Review? Just Ask Joannabot The Wall Street Journal Can an App Replace a Personal Trainer? I Tested Nearly a Dozen to Find Out - The Wall Street Journal Can an App Replace a Personal Trainer? I Tested Nearly a Dozen to Find Out The Wall Street Journal Apple Watch Is Becoming Doctors’ Favorite Medical Device - WSJ The Wall Street Journal This Ring on Your Finger Tracks Your Sleep. Is It Worth the Splurge? The New York Times How to Download Your Videos and Other Data From TikTok The New York Times Apple Headset Stalls, Struggles to Attract Killer Apps in First Year The Wall Street Journal The Only App That Always Wins the Battle for Your Attention The Wall Street Journal No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom The Register Exclusive | Wanted: Weekend Warriors in Tech The Wall Street Journal Android beefs up Bluetooth tag stalker protections The Register The Great AI Challenge: We Test Five Top Bots on Useful, Everyday Skills The Wall Street Journal Laptop makers stalled on repairability improvements The Register PC shipments stuck in neutral despite AI buzz The Register Exclusive | Google’s Gemini Live AI Sounds So Human, I Almost Forgot It Was a Bot The Wall Street Journal I’ve Been Driving an EV for a Year. I Have Only One Regret. - WSJ The Wall Street Journal Why You Might Suddenly Be Following Trump on Instagram and Facebook The New York Times Running Your Household Is a Second Job, but It Doesn’t Have to Be The Wall Street Journal |
![]() |
![]() |
![]() |
RELATED ARTICLES
SmartCar Memory Stick for LapTop Transfer Data With the new technology used to transfer information to from your digital camera to your laptop or PC using memory sticks which hold significant amounts of data it appears such technology will be perfect for net-centric cars. Where all the data is stored in a black box situation as many cars now have these features already. Why Get a Microsoft MCSE Certification? In the years of the dot com boom and bust, the Microsoft MCSE Certification has gotten its eye blackened over an over. Paper Microsoft MCSE's who were excellent at finding brain dumps and passing exams gave the Microsoft MCSE Certification a bad name. What Exactly are Screensavers? - part II Here are some tips on how to use screensavers:First of all you should be careful when you use a screensaver on a LCD. A pixel it's on when it's dark on a LCD. HTML Explained: Part 1 Want to save money while promoting your web-based business? Of course you do. Here's some advice on the matter, from a freelance copywriter who knows: it pays to learn the basics of HTML. Computer Performance Tips IntroductionIn this article I will clearly spell out the most effective steps you can take in order to increase the performance of your computer and enhance your computing experience.More Memory (RAM)If your computer has less then 256 MB of memory you may want to consider adding more. Password Nightmares Good Morning Mr. Sampson. How To Search Your PC With Google Desktop In this era of Internet, most people are frequent users of computers. Many of us use computers through out the day, accumulating morasses of information in various formats, which include email, digital photo, word document, spreadsheet, presentation file, ebook, article, other downloaded files, music, visited web pages, and many others. Digital Cameras + Photo Printers = Quality Instant Photographs In the 1950's and 1960's Polaroid's instant cameras were all the rage. You could shoot a picture and have the finished print in a minute or so. Temporary Fixes to Spyware, Ad-ware, and Virus Infections So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner. Home Video? Bring it On So you got yourself a digital camcorder. If you want to be able to edit and produce awesome home videos, you'll need some tools. Email Management If you utilize a computer at home or work it is likely that you use email. Email is an electronic message that is sent from one computer to another following a specific protocol (Simple Mail Transfer Protocol or SMTP). Gain Control Over Your Screensavers With These Simple Steps We all enjoy our favorite screensavers but in the same time we all hate to see that they sometimes disturb our movies, presentations and all the things we do and do not like to be disturbed from. Just read carefully this article and you will never have this problem again. Palm PC critique I met an entrepreneur who hole heartedly disagree with an article in Advertising Age by Bradley Johnson that Palm Pilot can keep their market share through brand name. We discussed RIMM Research in Motion and my stock in that company and I defended the wireless venue, but he went into a tirade, luckily I used a digital recorder and got most of it; basically here is his critique:"That grip has already eroded by Palm PC makers and clones. Plasma TV vs LCD TV For those seeking to buy their first flat panel TVdisplay device, it is easy to be confused with conflicting and counter claims bydifferent interest parties. So what is the truth in the competition between LCDand Plasma TV? Here's are some pointers before you rush out and buy your flatpanel TV on impulse . Virtual Memory - What is It? I recently got an e-mail asking about virtual memory. The person who sent me the question was getting an error on random occasions from their Windows operating system stating "Your computer is low on virtual memory". Review of Rio MP3 Players Below you will find some useful information and comments about a few of the most popular MP3 players by Rio, including the Nitrus, Carbon, Cali, and Forge. None of these MP3 players are perfect, but each offers a unique set of strengths and weaknesses that should be taken into consideration before you purchase any one of them. EDTV vs HDTV Confused by EDTV vs HDTV? We don't blame you. The number of acronyms floating about with regard to digital TV is frightening. 5 Steps to Remove Spyware for Free Have you ever tried to remove Spyware off your PC only tofind out it never left or it came back? Tired of all thoseannoying Popups, Viruses, and Ads on your system day in andday out? Well, listen closely because the day has come toremove Spyware programs and Viruses - forever!I will give you some very useful tricks and tips to removeSpyware and Viruses for good! Follow closely:Steps to Remove Spyware, Viruses, and Adware1. There are many types of software available today thatclaim to remove spyware off our system, but which one REALLYdoes the job? What you need is software that not only willremove spyware, but TOTALLY removes it for good and keeps itoff. Are You Well Protected? Winter?the official start of the cold and flu season. Though, technically speaking, things got started a little early. How To Speed Up Your Aging PC And Make It Healthier Too With a little tweaking and with proper tools, you can get a faster, healthier PC, virtually immune to spyware infections and browser hijackers. How is this possible? Find out about the latest tools and how they work. ![]() |
home | site map |
© 2006 |