Network Security Doesn’t Have To Be A Burden
Legacy signals
Legacy popularity: 1,042 legacy views
Whenever I log onto my computer, visit a subscriber web sites or check my emails I always get the screen “Please enter your User Name and Password”. To manage this authentication barrage I might use the same logon information for all my sites, make the passwords simply to remember and keep the same password for years. Now my company’s IT department has decided to increase security by making me change my logon password every 60 days, make it more than 8 characters long and it has to contain both numeric or special characters. Security is a necessary burden. But, does security really need to be a burden?
Of course there are times that I forget my password so I have to call IT and wait a few hours for them to reset my password. To make sure that I don’t forget them again I might write those passwords on post-it notes and stick them under my keyboard. Now that’s security since no one would ever think to look there! Does any of this sound familiar? Are you or your employees guilty of these same habits?
These practices violate all four of the golden rules to keeping passwords secure: 1) never use simple words or names that others can guess, 2) never writing down your passwords where others can find them, 3) never use the same password everywhere, and 4) never keep the same password for long periods of time.
What makes this whole tale more ironic is that I am in the computer security business. I know all the proper procedures, I know how hackers attacked computer systems and I know that over 70% of all identity theft occurs from co-workers, friends and even family members. But I am also human and trying to remember and type all my passwords is inconvenient, error prone and time consuming. So I decided to look for a way to make security so convenient that it no longer needed to be circumvented.
I now use a smartcard-based password manager that is easy to use and it allows me to easily manage all my digital identities on multiple computers and networks while exponentially increasing my security. Every one of my accounts now has its own long, unique, complex password that I don’t have to remember let alone type. Finally, smartcard based password managers protect computers from malicious software like spyware and keyloggers. Instead of “Dovell1″, my new password might be sdRy^k6()keHY. While I’m not totally password free since I still had to remember the one to authenticate me to the smartcard, I went from 98 different passwords down to 1.
It doesn’t matter if you use Power LogOn, RoboForm, VaultID or a host of any other token-based password manager products. The key is to use something, and make sure the product implement security features that protects your passwords if the token is ever lost or stolen.
In conclusion, I would add one more rule to the four golden rules:
GOLDEN RULE 5:Use a smartcard-based token to save passwords
Article author
About the Author
Access Smart is dedicated to empowering businesses and consumers to securely regain control over their digital information. Access Smart offers unique, high-quality, integrated hardware and software packages that securely manage important data over wired and wireless networks, computers, Point-of-Sale devices, kiosks, and any other device that can accept and communicate via smartcard technology.
Further reading
Further Reading
Article
Students Beware! Identity thieves are studying you!
It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...
Related piece
Article
Things to consider when trying to get out of debt!
On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...
Related piece
Article
Passwords Don't Have to Threaten Business Security
The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.
Related piece
Article
5 Mistakes to Avoid when Dealing with a Debt Collector
Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner
Related piece