Knowhow-Now Article

Insulating Poor Usability With Password Policy

If you are worried about hackers and the security of your multiple accounts in various websites and company systems, there is a good reason to worry. With people, businesses and all kinds of organizations around the world trying to establish an online presence, there is an immense challenge among hackers to try and pry open portals to these sites and networks by cracking your password. Whatever is their motivation, the bottom line is that, your account becomes the entry point of these hackers unduly exposing all the information there. This is the primary reason why organized companies ensure the security of their digital information by enforcing a Password Policy.

A password policy is a collection of rules deliberately designed by companies to heighten computer security. This is done by imposing these rules on each and every user of the company system that serves as a possible entry point for illegitimate external attacks. The policy intends to encourage users to create strong passwords and change them often. The imposition of the policies is typically adopted as part of security awareness training that is done either through advisory or mandated technical means.

Here are the usual concerns that password policies try to adequately cover:

1. Password Strength

•Usually policies require a minimum length for passwords, though eight characters is common. Some want to make it longer, but not longer than 14 characters. In some rules, a specific number of characters are required for compatibility with legacy systems.

• To ensure the strength of passwords, policies may include the use of both upper- and lower-case letters, use of special characters and some numbers.

• Policies may disallow the use of passwords found in the dictionary, proper nouns, brand names and those that match common or personal numbers like birthdates, plate numbers, etc.

2. Periodic Changing of Passwords

• Password policies can require users to periodically change passwords. This is a common strategy to fight hacking, but it may also impose difficulty when the date for the expiration is too close.

• The risk with often changing of passwords is the tendency to end up with weaker passwords. To avoid the repetition of passwords, policies may impose keeping a password history. Better yet, the users can be provided with a tool like password managers that allow generation of new passwords too while keeping a password history and easy retrieval as well as access.

• The use of a tool also circumvents the need for passwords to be memorized because the password manager can also allow automatic logging into the networks and accounts.

• In lieu of the tendency for periodic changing of passwords to lead to weak passwords, certain companies enforce a password policy that requires users to create strong passwords that is almost unhackable. The only drawback is when an unauthorized person gets the password and uses it without detection. The hacker can use it almost indefinitely.

3. Enforcing Best Practices for Password Management

• The password policy must be simple, practical and easy to remember. Complex policies are harder to enforce.

• A study on policies revealed that stringent polices "do not have greater security concerns; they are simply better insulated from the consequences from poor usability."

• Violations of these policies may include sanctions that may start with light warnings to stronger reprimands entailing possible loss of computer privileges or job termination. Because confidentiality is mandated by law, a violation of the policy can be regarded as a criminal offense.

Protecting a password is important in the face of too many threats in the cyber world. Hackers have different motivations, but whatever is the reason, unlawful hacking can always cause unpredictable disruptions in an operation or at the very least expose critical information. This is why companies create and enforce password policy.

Comments
Order by: 
Per page:
 
  • There are no comments yet
   Comment Record a video comment
 
 
 
     
Related Articles
If you have a new computer you need to make sure it is safe from virus, trojans, hackers etc. The business of protecting your computer can seem both scary and troublesome. In truth computer security is not so hard - common sense and our guide will help you!
13.01.2016 · From Andrew_Facebook
Mobile broadband routers have gained much popularity due to their capability to gain wider connectivity through your broadband connection - the same as your smartphone or mobile phone uses. Here’s how they work:
22.09.2015 · From Editor
The use of computer is prevalent nowadays, especially now that most industries have become reliant on the internet for their operation. At home, computers are indispensable. For this reason, basic knowledge on how to repair a computer becomes relevant.
21.05.2015 · From TheAuthor
Passwords are significant elements that can protect the integrity of an individual’s personal digital information or a company’s database. These can also effectively shun any person who may have malicious intents to gain access to the data. (...)
23.02.2013 · From Kristen
Are you having worries about keeping your passwords safe? If you want to create almost unhackable passwords and not forget your multiple passwords in multiple accounts and systems, use Password Managers. (...)
17.02.2013 · From Kristen
Ads
Article Info
481 Views
0 Subscribers
All Articles by Kristen
Sharing Is Good!
Rate
0 votes