Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Passwords and the Human Factor > NetSparsh - Viral Content you Love & Share

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.

It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.

The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.

Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.

Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.

In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.

About The Author

Terrence F. Doheny

President, Beyond If Solutions,LLC

www.beyondifsolutions.com

terry@beyondifsolutions.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Chief Executive Group

CEO Pulse: Is Personal Tech Helping Or Hurting Your Company?
Chief Executive Group
We asked approximately 100 CEOs attending our annual CEO Talent Summit, held this year in West Point, New York, to share their views on personal tech. According to 57.5% of CEOs, personal tech is helping the quality of interpersonal relationships and ...


GeekWire

Seattle startup vets take on Google with Helm, a new $499 personal email server
GeekWire
It's a bold bet that aims to provide comfort at a time when privacy and security issues related to personal data hosted by big tech companies in the cloud are top of mind. The idea comes from Giri Sreenivas and Dirk Sigurdson, two entrepreneurs who ...

and more »

New York Times

An Eye for Photography, but a Google Suite for Events
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? Whitney Richardson, an events manager for The Times in London, discussed the tech she's using. Q. What tech do you use to put together events? A. Over the past ...


Penn State News

IST students experience tech, culture and personal growth in exchange program
Penn State News
UNIVERSITY PARK, Pa. — Home to global companies like Samsung and LG, South Korea has come a long way technologically since the mid-1980s. Today, it boasts the world's highest internet speeds and most cellphone users, and is therefore often thought ...


New York Times

It's Her Job to Get More People to Act Like You Right Now
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? Millie Tran, a global growth editor for The Times, discussed the tech she's using. Q. You're the first-ever global growth editor at The Times. What does a ...


USA TODAY

Apple makes it easier to download your personal data
USA TODAY
A few months ago, if you wanted to find out what kind of personal information Apple had collected on you, you needed to navigate to Apple's privacy website, locate a hard-to-find tab to request the info and await its arrival. That changes today, with ...
Apple to US users: Here's how you can now see what personal data we hold on youZDNet
Apple is letting you download all the data it has on you – here's how to do itShortlist
How to download a copy of everything Apple knows about youCNBC

all 120 news articles »

New York Times

How to Delete Facebook and Instagram From Your Life Forever
New York Times
That means any personal information that I had collected in my account, including my photos, message transcripts and friends list, and that I did not already have copies of elsewhere. To help with this, Facebook offers a comprehensive tool called ...


CNN

Hackers accessed personal information of 30 million Facebook users
CNN
New York (CNN) Almost 30 million Facebook users' phone numbers and email addresses were accessed by hackers in the biggest security breach in the company's history, Facebook said Friday. The attackers accessed even more details on 14 million of ...
Facebook says hackers saw personal info of 14 million peopleNBCNews.com
An important update about Facebook's recent security incident | Facebook Help Center | FacebookFacebook
I can't log in. | Facebook Help Center | FacebookFacebook
Facebook Newsroom -AP News
all 1,325 news articles »

Beware Facebook hoax tricking people into thinking accounts hacked
The Oakland Press
Then, they send a bunch of friend requests to the original account's friend list, to try to scam the person's unsuspecting friends into granting access to their personal information by accepting the request. While account cloning is a real thing, the ...


New York Times

The Week in Tech: Executives Pull Out of Saudi Conference
New York Times
Hello from Washington, D.C., the hot seat of late for big Silicon Valley companies accused of being too powerful, undermining democracy and profiting off the personal details of our lives without our permission. I'm Cecilia Kang, The Times's technology ...

and more »
Google News

Cache In Your Chips And Get A Bus!

Computer related terminology could sometimes be daunting to newcomers. These... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

Customize Your Portable Player with an MP3 Player Accessory

Everywhere you look today people are listening to personal audio... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

Be Your Own IT Department

If you use a computer, you need to know more... Read More

Uninstall Windows Media Player 10 and Start Enjoying Your Media Again

Windows Media Player 10 has been full of bugs from... Read More

Registry Tools Demystified

Not sure what Windows registry is or how it works?... Read More

Five Simple Steps to Speed up Your Computer

Most people download and save so much information on their... Read More

Computer Viruses are Bad Luck

OK, so you caught a computer virus and your system... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

What Does That Error Message Really Mean?

Surf the 'Net for about 10 minutes and chances rate... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

How Does My PC Get Hot

There are many sources of heat that can raise the... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Portable DVD Players - Things To Know

In my humble opinion nothing makes a long trip easier... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

PC Tools Youd Never Think You Need

Do you use Windows standard uninstall feature? How do you... Read More

More Cool Web Tricks

If you ask most people what frustrates them most about... Read More

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

Is Your Web Browser Putting You At Risk?

It's free, it comes with Windows and it's used by... Read More

Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy... Read More

Taking Advantage of the iPod Experience

Music lovers have been carrying around radios and other bulky... Read More

404 Error Pages: What Are They And How Do You Create One?

We've all seen them, you've been browsing a website and... Read More

Healthy Webmasters Choose Ergonomic Computer Products

Webmasters usually sit at their computers much longer in a... Read More