Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Passwords and the Human Factor > NetSparsh - Viral Content you Love & Share

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.

It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.

The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.

The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.

These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.

Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.

Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.

In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.

About The Author

Terrence F. Doheny

President, Beyond If Solutions,LLC

www.beyondifsolutions.com

[email protected]

In The News:


Adweek

Infographic: What Millennials Value Most in Their Lives, Careers and Personal Tech
Adweek
A simple choice between A and B can say a lot about a person—or, in the case of 9GAG's just-released Millennial Black Paper, an entire generation. In April, the cross-platform entertainment network, which counts 150 million users around the globe ...


New York Times

Using New Space-Saving Photo Files
New York Times
Q. I have a new iPhone 8 with iOS 11. I thought the new system was supposed to save photos in that new H.E.I.F. format to save space, but when I send pictures as mail attachments, they show up as JPG files. What gives? A. Apple's recent iOS 11 update ...


Top Tech News

Kids, Screens and Parental Guilt: Time To Loosen Up?
Top Tech News
"I know I should limit my kid's screen time a lot, but there is reality," said Dorothy Jean Chang, who works for a tech company in New York and has a 2-year-old son. When she needs to work or finds her son awake too early, "it's the best, easiest way ...

and more »

New York Times

Moving the Windows 10 Taskbar by Hand
New York Times
Q. How do you move the taskbar to a different side of the screen on a Windows 10 tablet? I tried dragging it with my finger, and nothing happened. A. If a finger drag does not budge the taskbar, you can use a system setting, but you should make sure ...


New York Times

Taking Your iTunes Library to Android - The New York Times
New York Times
Apple's iTunes Store used to be more restrictive, but if you've purchased music there in the past eight years, you can play it more places.

and more »

Forbes

Top 10 Personal Technologies for Digital Business
Forbes
For astronauts on the International Space Station, needing a tool meant waiting months to piggyback on a scheduled supply run. But with the advent of 3D printers, the astronauts are able to on-demand print, for example, a racketing socket wrench with ...


New York Times

Editing Your History on Amazon
New York Times
Q. When I go to the Amazon site on my computer, it shows me a bunch of stuff I previously looked at. Is there a way to make it stop recording every product I click on? A. Amazon automatically tracks the products you browse on the site and compiles a ...


New York Times

Pioneering Virtual Reality and New Video Technologies in Journalism
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? Marcelle Hopkins, deputy video editor and co-director of virtual reality at The Times, discussed the tech she is using. Video has changed a lot in recent years.

and more »

New York Times

Tech Giants Are Paying Huge Salaries for Scarce AI Talent
New York Times
Tech's biggest companies are placing huge bets on artificial intelligence, banking on things ranging from face-scanning smartphones and conversational coffee-table gadgets to computerized health care and autonomous vehicles. As they chase this future, ...

and more »

NPR

Should College Professors Give 'Tech Breaks' In Class? : 13.7 ...
NPR
Is it necessary coddling or just good science to give college students breaks to check their phones? Anthropologist Barbara J. King takes a look.

and more »
Google News

Put Order and Information into File Names

Unless you place your faith in internal search engine software... Read More

Review of Rio MP3 Players

Below you will find some useful information and comments about... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

Back Up, Back Up, Back Up!

This is not your typical lost data story. I was... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

Maintain Your Computer ? Keep Your Business Running

Maintaining your computer is extremely important ? especially if you... Read More

Tips For Finding Great Deals On Computer Accessories & Supplies

Tip #1. Do a Google search. Don't be to general... Read More

Upgrading Your PC for Non-experts

IntroOne of the big advantages of PCs over earlier types... Read More

Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC,... Read More

The Ipod Mini: Why Its Not that Hot

I got my eyes set on a iPod mini, as... Read More

What?s the Difference Between Plasma TVs and LCD TVs?

Plasma and LCD TVs are the latest trend in home... Read More

System File Checker - A Maintenance Utility

System File Checker is a great utility that is typically... Read More

Selecting a Personal Digital Assistant

A Computer in Your HandCarrying around an address book and... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

Wordpress Plugins

Maybe you always wanted a feature that hasn't been available... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

Bios Term

BIOS - Basic Input Output SystemThe central processing unit of... Read More

Learn the Lost Art of Touch Typing

Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

Desktop Security Software Risks - Part 2

This is the third in a series of articles highlighting... Read More

What Has A Portable MP3 Player Have To Do With Your Business

Plenty! When we made the decision to be our own... Read More

How To Safeguard Your Computer?

The following practice, if done regularly, may help you to... Read More