God's Computer Manual
Today, passwords are spoken, typed and handwritten in many ways, but the purpose is always the same; to select and protect.
The greatest evil incidents have in most cases been possible because of some sloppy management of security measures. Probably the most obvious is the choice and storage of passwords.
In spite of repeated emphatic security training in the choice of passwords, people still foolishly choose street numbers, family names, familiar objects, and hobby items as their passwords.
There are even computer virus programs that can test thousands of possible passwords to discover an access code, in an instant, all automatically.
The second foolish thing people do, especially in the business world, is create a list of passwords sometimes even with a description of where each password is used. As time passes, the old list is put in the trash dumpster. Dumpster Divers are evil individuals who climb down into trash dumpsters and search through discarded paperwork THAT WAS NOT SHREDDED. Diligence often pays off with finding someone’s password list. If possible, don’t store the whole password in the same list. Make them cryptic, non-sensical.
This practice is terribly dangerous. Search the web for best safeguards and processes.
Godscomputermanual.com
No comments:
Post a Comment