Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.

It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.

The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.

Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.

Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.

In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.

About The Author

Terrence F. Doheny

President, Beyond If Solutions,LLC

www.beyondifsolutions.com

[email protected]

In The News:

Facebook says service hindered by lack of local news  The Oakland PressNEW YORK (AP) — Facebook's effort to establish a *service* that provides its users with local news and information is being hindered by the lack of outlets where ...
This Tech Makes D.I.Y. Key Duplication Easy. Maybe Too Easy.  The New York TimesYou can now take key duplication into your own hands using kiosks and apps from start-ups. Our columnist explored whether the benefits of this outweigh the ...
Spending Is as Easy as Pushing a Button. The Hard Part? Keeping Track.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Tara Siegel Bernard, a personal finance reporter, discussed the tech ...
10 must-do tips for protecting your personal Facebook data  TechGenixIf you don't protect your personal Facebook data, you may find yourself the target of identity theft, extortion, hacking, stalking, or financial fraud.
Serial hacker back with 26 million users' personal data  Hindustan TimesPersonal data of 26 million people were put up using the services of six different companies globally for a value of up to 1.4231 bitcoin, or around $4940.
Does Femtech Give Users Control of Their Health or Take It Away?  The RingerApps to track menstruation cycles and fertility are being marketed as tech that helps people take better care of their bodies. But who stands to reap the real ...
Trump’s views about ‘crazy’ self-driving cars are at odds with his DOT  TechCrunchPresident Donald Trump is an automated-vehicle skeptic, a point of view that lies in stark contrast with agencies within his own administration, including the U.S. ...
Beware the Tech Industry's Latest Privacy Trojan Horse  ACLUDid you hear the story about the do-gooder tech company that is pushing new state “privacy” bills across the nation?
Limiting Your Digital Footprints in a Surveillance State  The New York TimesTo protect himself and his sources from prying eyes in China, Paul Mozur, a technology reporter in Shanghai, leaves just an “innocent trace” of digital exhaust.
Where a TV Pro Goes for Video When YouTube Just Won’t Do  The New York TimesDonald Trump's old vlog? An archive of closed captions? Liz Day, a senior story editor for The Times's new television show, “The Weekly,” knows how to find ...
Apple bestows first hardware upgrades in years upon neglected iPad Mini and Air lines  The RegisterApple has tinkered with its iPad line, resurrecting the Air and administering a bit of mouth-to-mouth to the Mini as the company battles tottering sales. The iPad ...
Location to financial and personal data: 7 things tech companies know about you  Moneycontrol.comTech companies have made life easy in innumerable ways but users have been made to pay a heavy price. User data has been monopolised in every single ...
With Tech on the Defensive, SXSW Takes an Introspective Turn  WIREDElizabeth Warren took a shot at Big Tech. And people who are already concerned with the industry's size, privacy issues, and ethical conundrums want ...
Sprint customers say a glitch exposed other people’s account information  TechCrunchSeveral Sprint customers have said they are seeing other customers' personal information in their online accounts. One reader emailed TechCrunch with ...
Facial recognition: Apple, Amazon, Google and the race for your face  CNETFacial recognition technology is both innovative and worrisome. Here's how it works and what you need to know.
How to Take Music Lessons Whenever (and Wherever) Works for You  The New York TimesPlaying an instrument can be a rewarding hobby, but if finding the time and a teacher is a challenge, many apps can help get you started.
Women in tech: Success still hangs on relationships and privilege  EngadgetMarch is Women's History Month and last Friday was International Women's Day. Many organizations, including tech companies, took the opportunity to ...
Apple analysts skeptical that a foray into video will do anything to power up earnings  Vancouver SunThe skepticism about Apple Video comes at a time when Apple has been struggling with weak demand for the iPhone.
Imagine if Alexa had no gender — researchers have created a voice that is neither male nor female  CNBCQ is a deceptively simple solution to the problem of female-first virtual assistants.
EU gov’t and public health sites are lousy with adtech, study finds  TechCrunchA study of tracking cookies running on government and public sector health websites in the European Union has found commercial adtech to be operating ...
How an App Creates ‘Disturbingly Agile Millennial Thumbs’  The New York TimesIsabella Kwai, a reporter in Australia, rarely takes notes on paper anymore and instead uses her iPhone. She can still look sources in the eye while typing.
What’s Next for Smartphones? Samsung’s New Galaxy Line Offers a Few Answers  The New York TimesOne of the company's newly unveiled models works with 5G wireless networks. Another folds up like a book.
Samsung Galaxy S10 Plus Review: A $1,000 Smartphone With Compromises  The New York TimesDespite being an excellent phone with an innovative wide-angle camera, Samsung's new flagship device lags Apple in biometrics.
A huge trove of medical records and prescriptions found exposed  TechCrunchA health tech company was leaking thousands of doctor's notes, medical records, and prescriptions daily after a security lapse left a server without a password.
A Master Class In The Gig Mindset With Microsoft's Paul Estes  ForbesPaul Estes, who is leading Microsoft's gig economy strategy, talks about the importance of the gig mindset in the freelance revolution.
Vikram Jandhyala, UW innovation leader and key figure in Seattle tech, dies at age 47  GeekWireVikram Jandhyala, the University of Washington's vice provost for innovation and a key link between the UW and the Seattle region's technology community, has ...
YouTube suspends comments on videos of kids | Personal Tech  The Oakland PressSAN FRANCISCO (AP) — YouTube said Thursday it will turn off comments on nearly all videos featuring kids — potentially affecting millions of posts on the site ...
Personal information of more than 800000 blood donors exposed online by tech vendor: HSA  Channel NewsAsiaSINGAPORE: The personal information of 808201 blood donors in Singapore was left exposed on the Internet for a period of nine weeks from Jan 4, ...
National Enquirer paid $200K to Lauren Sanchez's brother for Jeff Bezos texts, report says  USA TODAYMichael Sanchez was reportedly paid $200000 to leak texts between his sister and Amazon CEO Jeff Bezos, the Wall Street Journal reports.
You Give Apps Sensitive Personal Information. Then They Tell Facebook.  The Wall Street JournalMillions of smartphone users confess their most intimate secrets to apps, including personal health information. Unbeknown to most people, in many cases that ...
Users should protect internet-connected doorbells, speakers and more  The Oakland PressIn some households there's likely to be multiple internet-connected devices working off the home's wifi. While many of the obvious devices — computers, ...
From closets to cooktops, tech aims to bring efficiency home  The Oakland PressLAS VEGAS (AP) — Closets that freshen clothes, cooktops that won't let pots boil over, faucets told to dispense just enough water to fill the coffee maker.
Hey, Google, Siri or Alexa: Which voice assistant handles these 100 questions best?  USA TODAYMANHATTAN BEACH, Calif. — Asking a personal assistant to read back your new e-mails shouldn't be that hard, right? After all, if Google could turn on and off ...
Meet Camilla Brewer, a Welcoming Face at the LGBTQIA Resource Center  Georgia Tech News CenterCamilla Brewer, coordinator for the LGBTQIA Resource Center, has been in the newly created position since May. “Tech hiring this position has really helped ...
Facebook’s Data Deals Are Under Criminal Investigation  The New York TimesFederal prosecutors are conducting a criminal investigation into data deals Facebook struck with some of the world's largest technology companies, intensifying ...
Recode Daily: Facebook is left cleaning up a mess after the New Zealand terrorist attack was streamed on the …  RecodeSocial media companies like Facebook scrambled to take down New Zealand mosque shooter videos, but they couldn't stop them from being posted in the first ...
What Facebook's 'privacy vision' really means | Personal Tech  The Oakland PressNEW YORK (AP) — Mark Zuckerberg's abrupt Wednesday declaration of a new "privacy vision " for social networking was for many people a sort of Rorschach ...
On a cell phone during a car crash? Nevada may let cops use technology to find out  USA TODAYNevada may be one of the first states to let police to use a contentious technology to find out if a person was using a cell phone during a car crash.
8 tips to improve your password security | Personal Tech  The Oakland PressLet's talk about passwords. While necessary for our digital security, they remain without a doubt one of the most annoying parts of our digital lives both at work ...
Academic at centre of Cambridge Analytica scandal sues Facebook  The GuardianThe academic at the centre of the Cambridge Analytica scandal is suing Facebook for defamation over the social network's claims that he lied about why he was ...
China Deploys 'Breakthrough' Surveillance Technology To Arrest 13,000 'Terrorists'  ForbesChina's claims of 13000 terrorist arrests in Xinjiang will do nothing to justify the extent of population control and detention camps in the province, but it will shine ...
More than 800000 blood donors had personal data exposed, in latest leak in Singapore  TechgoonduIn yet another medical data leak, 808,201 blood donors in Singapore had their personal details exposed in January this year, after a Health Sciences Authority ...
Google’s Nest hub has a microphone it forgot to mention  Vancouver SunIt's been inactive since its launch, and requires customer to activate — but this isn't the company's first privacy oversight.
Q&A: Crypto-guru Bruce Schneier on teaching tech to lawmakers, plus privacy failures – and a call to techies to act  The RegisterRSA Politicians are, by and large, clueless about technology, and it's going to be up to engineers and other techies to rectify that, even if it means turning down ...
Your guide to the 2020 Democratic presidential candidates  QuartzUpdated March 17, 2019. With 13 confirmed candidates, three exploratory committees, and multiple “maybes,” the Democratic field for the 2020 presidential ...
A $10 Accessory Proves Smartphones Are Too Big  The Wall Street JournalPhones are too big and too hard to hold and use with one hand—and that's why PopSockets last year sold 60 million PopGrips, a grip that attaches to the back of ...
Popular Apps Cease Sharing Data With Facebook  The Wall Street JournalPopular health and fitness apps scrambled to stop sending sensitive personal information to Facebook after The Wall Street Journal reported Friday many were ...
The reason Black in Tech Nashville's leader fights for girls of color is personal  The TennesseanFallon S. Wilson grew up in a family where men beat women -- and now she wants to use technology to empower black girls to avoid growing up like she did.
Here’s what global tech CEOs have to say about India's data protection laws  Business Insider IndiaGlobal tech CEOs have been voicing their concerns against India's proposed Personal Data Protection Bill to looks to localise the data of Indian users. Ginni.
Tangled wires, digital photos: Here's how to declutter your personal tech  Economic TimesEveryone has a drawer full of ancient cellphones, tangled-up wires and earphones that are never touched.
Game Review: Third time proves not to be the charm for Kingdom Hearts III  Digital News AsiaThe game however, does indeed deliver on the promise of greatly enhanced graphics.
Change your screen habits from time-wasting to money-saving  The Oakland PressApple's Screen Time feature can tell you more about your iPhone usage than you may care to know.
UK wants tougher rules for Facebook's "Digital gangsters"  The Oakland PressLONDON >> British lawmakers issued a scathing report that calls for tougher rules to keep Facebook and other tech firms from acting like "digital gangsters" and ...
How to Declutter and Organize Your Personal Tech in a Few Simple Steps  The Indian ExpressAccessories and data may not take up much physical space, but they contribute to frustration and anxiety. Here are ways to keep e-junk at bay, Marie ...
Facebook’s new encrypted network will give criminals the privacy they crave  The GuardianDearly beloved, our reading this morning is taken from the latest Epistle of St Mark to the schmucks – as members of his 2.3 billion-strong Church of Facebook ...
Facebook and Instagram are down for users across the globe  Calgary HeraldUsers of Facebook Inc. and two of its popular side shoots, Instagram and Messenger, are experiencing technical difficulties Wednesday. Reports on ...
A Movement for Personal Data Protection From Tech Giants Rises in China  Pacific StandardWhen Mark Zuckerberg testified before Congress last spring, he argued that regulating Facebook's use of personal data would cause the United States to fall ...
UK online pornography age block triggers privacy fears  The GuardianGovernment to confirm launch date of nationwide age block on pornographic *content*.
Facebook is back up after what some say was the platform's longest outage ever  Financial PostFacebook Inc said on Thursday it had restored *service* to its main app and Instagram, after the world's largest social network suffered a major outage that ...
iPhone trends going 'from bad to worse,' as Apple struggles with slow demand  Financial PostAnalyst says lack of a rebound in iPhone sales creates risk and shifts more focus to Apple's March 25 event.
What Is 5G? Here’s What You Need to Know About the New Network  The New York TimesThe transition to new fifth-generation cellular networks, known as 5G, will affect how you use smartphones and many other devices. Let's talk about the ...
‘The Effects Cannot Be Overstated’: When Tech Invaded Media  The New York TimesJim Rutenberg reflects on the convergence of technology with media, and how that has changed his consumption habits and coverage. (Warning: iPhone ...
From town square to living room: Zuckerberg announces sweeping changes to Facebook in new focus on privacy  Financial PostFacebook will shift to a platform where people communicate with smaller groups and their *content* disappears after a short period of time.
The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing  The New York TimesFrom Facebook to creepy online ads, the worst tech of the year made the internet feel like an unsafe place to hang out. Yet there were some products that were ...
Digital Privacy Is a Big Concern in Europe. For This Reporter, Too.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Matt Apuzzo, an investigative correspondent in Brussels, discussed ...
Tech Firm in Steele Dossier May Have Been Used by Russian Spies  The New York TimesA former F.B.I. cyberexpert found evidence that suggests that Russian spies used networks run by Aleksej Gubarev to hack the Democratic Party in 2016.
Devices That Will Invade Your Life in 2019 (and What’s Overhyped)  The New York TimesA.I. that responds to your voice. Next-generation wireless networks. If this year's biggest consumer technology trends have a familiar ring, there's a reason for ...
Trump administration ignoring human rights monitors, ACLU tells UN  The GuardianWatchdog delivers scathing appraisal to UN council as total of unanswered rapporteur requests rises to 22.
He Reported on Facebook. Now He Approaches It With Caution.  The New York TimesNick Confessore, an investigative reporter who has written about social media and data privacy, has changed his tech habits after what he has learned.
iPhone prices slashed in China for second time this year amid sinking sales  Financial PostSHANGHAI — Chinese online retailers have started discounting iPhones for the second time this year as Apple Inc wrestles with a prolonged sales slowdown in ...
Facebook employees angry at treatment of moderators, who have one of internet's most dystopian jobs  Financial PostIn the wake of the 2016 presidential election, Facebook Inc. rushed to expand efforts to police its platforms, trying to keep political misinformation, graphic ...
'Shame!' Amazon gets $23m from Virginia county amid fierce protests  The GuardianProtesters repeatedly shouted “shame” as a northern Virginia county board unanimously approved a $23m incentives package for Amazon to build a new ...
China data leak exposes vast hi-tech surveillance operation in Xinjiang  South China Morning PostA Chinese surveillance firm is tracking the movements of more than 2.5 million people in the far-western Xinjiang region, according to a data leak flagged by a ...
My home tech setup for 2019  Business InsiderTechnology can vastly improve the quality of your home and life. I've listed the computers, gadgets, and accessories I'm using on a personal basis in 2019 ...
10 Cheap Tech Stocks to Buy for Under $10  Kiplinger's Personal FinanceHere are 10 cheap tech stocks to buy for less than $10 each that show significant growth potential, according to Wall Street's analyst community.
In a Stumble for Apple, a FaceTime Bug Lets iPhone Users Eavesdrop  The New York TimesA glitch in the video and audio calling app, which the company says it will fix, can turn the device into one perhaps better suited for espionage.
Setting Up Your Tech on the Assumption You’ll Be Hacked  The New York TimesSheera Frenkel, who writes about cybersecurity for The Times, explains how she safeguards her devices, and why passwords remain a weak link for more ...
The Most Important Kitchen Tools This Holiday (or Any Season, Really)  The New York TimesTech has brought innovation, convenience and smarts to the kitchen. Here's what Melissa Clark uses and the tools she finds indispensable.
You Don’t Have to Be a Journalist to Want to Keep Chats Private  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Kate Conger, a technology reporter for The Times in San Francisco, ...
It’s Her Job to Get More People to Act Like You Right Now  The New York TimesMillie Tran, the first global growth editor at The Times, discusses how she tries to understand and nurture a worldwide audience. “So many dashboards and data ...
The Sun Sets. The Wind Dies. But Energy Data Is Relentless.  The New York TimesAlternative power sources have upended the electric grid. Ivan Penn, who covers the beat, discusses the changes and how he keeps track of them.
How to Save on Your Next Apple Purchase  The New York TimesGadgets like Apple's iPhone have become so powerful and durable that you can wait many years before buying a new one. The bad news is that your next ...
Quirky but Useful Gifts: Rob Enderle's 2018 Personal Tech Product Guide  TechNewsWorldThis is the time of year for a product guide, and this year I thought I'd list my favorite unusual products as gift ideas. I'm a big fan of products most people don't ...
Just Embed a Phone Into This Editor’s Mind, Already  The New York TimesChoire Sicha, who runs The New York Times's Styles desk, has such a close relationship with his smartphone, he says, it may be time to “punch the circuitry into ...
Social Media’s Re-engineering Effect, From Myanmar to Germany  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Max Fisher, a reporter based in London who co-writes The ...
Is your phone always low on battery and chewing through data? Blame 'DrainerBot', Oracle says  Financial PostA sneaky piece of advertising software may be responsible for driving up millions of Android users' mobile data usage and wasting their device's battery life, ...
The Benefits (and Limits) of Using Tech to Plan a Wedding  The New York TimesOur newly engaged tech columnist tried to use tech to plan his wedding. He was immediately overwhelmed by the complexity of the process.
When a Tech Reporter Doesn’t Use Much Tech  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? David Streitfeld, a technology reporter in San Francisco, discussed ...
Apple iPhone XR Review: A Cheaper Phone Suited to Most of Us  The New York TimesGood news, Apple loyalists: You won't have to burn $1,000 on your next iPhone. That's because for about $750, you can have the iPhone XR, which is just as ...
Staying Plugged In (for Hundreds of Miles) on the Campaign Trail  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Sydney Ember, a politics reporter for The Times, discussed the tech ...
An Arsenal of Skype, Voice Recorders and FOIAs  The New York TimesEmily Bazelon, an investigative reporter at The New York Times Magazine, craves easy-to-use tools, whether for interviews, Freedom of Information Act records ...
How to Rescue, Repair and Revive Old Family Photos  The New York TimesIf the march of time is eroding your personal picture archive, give your beloved images new life.
Spotting Disinformation Online Before the Midterm Elections  The New York TimesRumors. Inflammatory and divisive messages. Doctored photos. Kevin Roose, technology columnist, explains how he has waded into that shadowy world to ...
How to Delete Facebook and Instagram From Your Life Forever  The New York TimesLost faith in Facebook and Instagram after data leakages, breaches and too much noise? Here's a guide to breaking up with the social network and its ...
The Easy (and Free) Way to Make a Budget Spreadsheet  The New York TimesWith a little time, typing and easy-to-use software, you can quickly see your financial picture much more thoroughly and better plan for the future.
The Essentials for Covering Silicon Valley: Burner Phones and Doorbells  The New York TimesReporting on secretive technology companies sometimes means finding people who don't want to be found. Jack Nicas, who covers Apple, relies on some ...
We Were Promised Mind-Blowing Personal Tech. What’s the Hold-Up?  The Wall Street JournalThe next big leap will free us from the computers in our pockets. But according to Joanna Stern, it won't be here anytime soon.
When the Tools of the Trade Are the Keyboard and Mouse  The New York TimesFor Daisuke Wakabayashi, who covers Google, computer accessories are important. Very important.
New York Requests Documents from Facebook, Apps on Data Sharing  The Wall Street JournalA New York regulator is ramping up a promised investigation of how Facebook Inc. FB -2.46% gathered sensitive personal information from popular smartphone ...

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

COOKIES - What Are They!!

Cookies, not the kind that Mom makes, but the computer... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Selecting a Personal Digital Assistant

A Computer in Your HandCarrying around an address book and... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

What Has A Portable MP3 Player Have To Do With Your Business

Plenty! When we made the decision to be our own... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

PC Tools Youd Never Think You Need

Do you use Windows standard uninstall feature? How do you... Read More

Basic Computer Thermodynamics

That desk in front of you and everything else around... Read More

How To Recognize The Telltale Signs Of Spyware

Spyware is the software that collects information about your online... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

How Does a Palm Pilot Work?

Just The Facts, Ma'mPalm pilots are all the rage now.... Read More

Help, I Need a New HDTV! (Part 5 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Is DVD Storage An Attractive Alternative For Your Computer Backup?

If you have a computer for home use or for... Read More

Ergonomics and Healthy Computing - Positioning Your Body For Maximum Comfort At Your Computer

Do you remember the old saw about how computers would... Read More

Bluetooth Headphones For Your PDA

Nothing is worse than having to negotiate all kinds of... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

Tips For Finding Great Deals On Computer Accessories & Supplies

Tip #1. Do a Google search. Don't be to general... Read More

Flash Your nVidia Video Cards BIOS

You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

4 Easy Ways to Speed Up A Sluggish PC

Computers are supposed to speed up our productivity?to help us... Read More

The Best MP3 Players Under $100

You don't have to fork out $250 for a super-diggy-whizbang... Read More

Lives With Games Tradition and Industry

The United States Of America citizen feels that games is... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More