It Security And You! Part 1: Passwords
- Date: 2007-04-17 - Word Count: 694
Share This!
Did You Lock the Doors and Windows When You Left For Work This Morning?
Part 1: Passwords
Overview
In this series of articles I will cover several security related issues that apply to how we use computers and what we can do to prevent financial loss, embarrassment and loss of business. We can all blame any browser and any operating system for the flaws they have, some favour Firefox some IE as browsers. Many that have said one is more secure than the other may have and often do have a valid point; however, some of them and maybe you are worried about the security of a browser, yet, leave the front door wide open and the pc un-attended logged into the bank account!
The above might sound far-fetched, and indeed if you drive round your local neighbourhood you will see, most if not all front doors closed (but not windows). When I speak of the front door I am actually referring to the many doorways we can potentially leave open into our personal and professional lives and businesses.
If you think I am referring to techi hackers, and think why would they target me, don't stop reading, I will tell you why they would target you and why it is not just the techi hacker.
This series of articles will not cover all IT security measures but will give some guidance on several common areas.
Who am I?
I am a 'Techi', a developer of large client server applications including the online business community, SME Guild. To become a 'Techi' of this level I have experienced many other levels of IT and business, both related to and as far removed from IT as you can imagine. I am also a businessman with my own company.
The reason I am telling you this is so you can see that what I write in this article is based on experience, not just what I have read elsewhere.
Passwords
I have in the past had to access other peoples PCs and they have not been there to give me the password, yet I rarely had trouble getting logged on, yet I am not a hacker and at the time was hardly what I would class as technical. Good systems prevent bad passwords, but many people still either do not activate higher levels of security or are using less secure systems that let them get away with being lazy.
Remember if something is designed to ask for a username and password, it is meant to be secure to some level and you should respect that, it is protecting something, normally YOU!
Do not use a blank password, or any of the following:
Sex, God, Admin, System, Money, Love
Especially do not use PASSWORD in any of its forms; it is the default for all sorts of things, including Routers - how mad is that?
Do not use your email address.
Whenever any of the above did not work I asked the PC owners co-workers and often they knew the password (Not a good idea). Sometimes they knew an old one, so I would add numbers sequentially to the old password and most times that would work (Do not keep adding numbers to your password each time you change it).
Do not keep a book or Post It with your passwords on in an unsecured location, what is the point of a password if there is a big yellow sticky thing with PASSWORD: blah blah, stuck to your monitor, people do it!
Finally in the password issues raised here, do not use a loved-ones name, be it a pet or a person. I once employed an IT manager who should have known better, but used his girlfriends name, he did add one twist that made it a little harder to crack, he replaced some letters with numbers like on a calculator L= 7 E = 3 and so on.
So, do have passwords, use them whenever prompted, make them difficult to guess, stay away from words that can be associated with you like interests (Do not use one theme like Star Trek, or Composers) and names, use upper and lower case letters, some punctuation and numeric's, and never do a password less than 6 characters in length.
Part 1: Passwords
Overview
In this series of articles I will cover several security related issues that apply to how we use computers and what we can do to prevent financial loss, embarrassment and loss of business. We can all blame any browser and any operating system for the flaws they have, some favour Firefox some IE as browsers. Many that have said one is more secure than the other may have and often do have a valid point; however, some of them and maybe you are worried about the security of a browser, yet, leave the front door wide open and the pc un-attended logged into the bank account!
The above might sound far-fetched, and indeed if you drive round your local neighbourhood you will see, most if not all front doors closed (but not windows). When I speak of the front door I am actually referring to the many doorways we can potentially leave open into our personal and professional lives and businesses.
If you think I am referring to techi hackers, and think why would they target me, don't stop reading, I will tell you why they would target you and why it is not just the techi hacker.
This series of articles will not cover all IT security measures but will give some guidance on several common areas.
Who am I?
I am a 'Techi', a developer of large client server applications including the online business community, SME Guild. To become a 'Techi' of this level I have experienced many other levels of IT and business, both related to and as far removed from IT as you can imagine. I am also a businessman with my own company.
The reason I am telling you this is so you can see that what I write in this article is based on experience, not just what I have read elsewhere.
Passwords
I have in the past had to access other peoples PCs and they have not been there to give me the password, yet I rarely had trouble getting logged on, yet I am not a hacker and at the time was hardly what I would class as technical. Good systems prevent bad passwords, but many people still either do not activate higher levels of security or are using less secure systems that let them get away with being lazy.
Remember if something is designed to ask for a username and password, it is meant to be secure to some level and you should respect that, it is protecting something, normally YOU!
Do not use a blank password, or any of the following:
Sex, God, Admin, System, Money, Love
Especially do not use PASSWORD in any of its forms; it is the default for all sorts of things, including Routers - how mad is that?
Do not use your email address.
Whenever any of the above did not work I asked the PC owners co-workers and often they knew the password (Not a good idea). Sometimes they knew an old one, so I would add numbers sequentially to the old password and most times that would work (Do not keep adding numbers to your password each time you change it).
Do not keep a book or Post It with your passwords on in an unsecured location, what is the point of a password if there is a big yellow sticky thing with PASSWORD: blah blah, stuck to your monitor, people do it!
Finally in the password issues raised here, do not use a loved-ones name, be it a pet or a person. I once employed an IT manager who should have known better, but used his girlfriends name, he did add one twist that made it a little harder to crack, he replaced some letters with numbers like on a calculator L= 7 E = 3 and so on.
So, do have passwords, use them whenever prompted, make them difficult to guess, stay away from words that can be associated with you like interests (Do not use one theme like Star Trek, or Composers) and names, use upper and lower case letters, some punctuation and numeric's, and never do a password less than 6 characters in length.
Related Tags: identity theft, business, network, security, it, pc, passwords
David Baldwin is the Managing Director of Working Pulse Ltd (www.workingpulse.co.uk). David designed and created SME Guild, the UK based online business community (www.smeguild.com) so all businesses (self-employed to large SME's) could benefit from each other's experience, find business contacts, new suppliers, networking opportunities, buy and sell online and much, much more!Join before 1st May 2007 to get one year's FREE membership to SME Guild. Your Article Search Directory : Find in Articles
Recent articles in this category:
- The No. 1 Rule For Projecting Confidence - Speak With Authority
One of the most important characteristics a person can project in a business setting - or any situat - After the Autumn Checkout European Debt Crisis and U.S. Brewing Rebound
In the commotion caused by the Fed on interest rates come to an end, the "disastrous" for the euro a - Advantages Of Arcade Game Rentals
There are many different advantages to arcade game rentals. Most people need something to release th - A General Primer on Truck Cargo Nets
In modern highways it is quite rare to see truck cargo nets in action, this is because they are usua - The United States Will Burst More Severe Financial Crisis
Not long ago, suddenly announced that the central bank to raise interest rates, the interest rate hi - Niche Marketing Profits - 3 Easy Steps to Finding a Profitable Niche Market Income in 10 Minutes
Like most beginners I was having a very difficult time trying to find a niche market to earn extra m - The Importance of Hospitality Management Consulting Firms Toronto
Businesses and the managers that help guide any business are in a constant state of improvement and - New Keynesian Theory Label
2010 winner of the Nobel Prize in Economics three theories have been labeled as "New Keynesian" labe - Federal Reserve Pouring Money QE2 Unpredictable Fortune
U.S. economist Milton Friedman proposed a "throw the cash from a helicopter" view, while the practic - Fiscal Consolidation Should no Longer Delay
British Chancellor of the Exchequer George Osborne today announced fiscal consolidation policy, shoc
Most viewed articles in this category:
- Common Financial Problems to Avoid
One must first change their habits and not procrastinate. American Consultants Inc at offers key fi - How a Bad Hire Can Hurt Your Business
What's worse - hiring the wrong person or not hiring anyone at all? Companies can become almost des - Joel Comm Is Dr. Adsense
What is Adsense? If you are new to making money online and net marketing, you may not know what Ads - 5 Steps For A Dynamic Wealth System Online
Recipe: Opportunity + knowledge + Dynamic Wealth System + Your Action = Massive Success!!! Step 1 - How To Stop Foreclosure
Losing your house to a foreclosure can be very scary. There are times when circumstances are ou - How to Always Pitch A Strike
As business owners, we are always working on new ways to convince people to become customers, client - Membrane Diffuser Solutions for Wastewater Treatment Systems
In the aeration basin of a typical wastewater treatment plant there are both organic and inorganic m - Another Year Hating Your Job or Loving Life?
Copyright © 2007 Mary Foley I've come to the conclusion that to be successful - really successf - Dyestuff Industry In India And China
World demand for dyes and organic pigments to touch $10.6 billion in 2008According to a study on dye - Cma-cgm Case : the Series of Lawsuits Continues in Syria, Lebanon, Egypt, France, England and the United States
Damietta company case : The series of lawsuits continues in Syria, Lebanon, Egypt, France, England a