Password Management One Link in IT Security Chain

John Storts

If you are like me, you have somewhere close to a dozen passwords (maybe more) that grant you access to your most frequently visited sites on the Web, from banks to social networks to e-mail providers. Managing those passwords can become a chore as they increase. That's where using the same password for multiple accounts becomes very attractive, especially if you are wary of storing them in any location (digital or good ole paper-and-pen "analog" records). But nearly everyone "in the know" on the matter from an IT security vantage point would say this about such a practice:

 

Don't do it!

 

IT Business Edge's Paul Mah even suggests you shouldn't use the same password(s) across professional and personal lines. If creating a new password for every account you use proves too daunting a task, you should at least use different ones between, for instance, your work e-mail account and your personal e-mail account. In addition to this, you should make sure you create robust, secure passwords by not using easily obtained personal information or sequential numbering. After all, your maiden name probably isn't that hard to find, and "12345" isn't safe enough for your luggage, much less your sensitive business information.

 

Passwords have become so commonplace as a security "checkpoint" that we begin to take them for granted in terms of their potential for "first response" security breach prevention. Don't let something as simple to manage as a password compromise your personal or professional info.


Check out more password-security content on IT Business Edge and the Knowledge Network:


5 Password Rules Every User Should Know (slideshow)

Sample Password Policy

Enterprise Password Management Guide

Password (not) Protected



More from Our Network
Add Comment      Leave a comment on this blog post
Apr 3, 2010 10:55 AM Janice Taylor-Gaines Janice Taylor-Gaines  says:

In David Scott's words, everyone needs to be a mini-Security Officer in the modern organization today.  I think Mr. Scott is right:  Most individuals and organizations enjoy Security largely as a matter of luck.  Anyone else here reading I.T. WARS?  I had to read parts of this book as part of my employee orientation at a new job.  The book talks about a whole new culture as being necessary-an eCulture-for a true understanding of security, being that most identity/data breaches are due to simple human errors.  It has great chapters on security, as well as risk, content management, project management, acceptable use, various plans and policies, and so on.  Just Google IT WARS-check out a couple links down and read the interview with the author David Scott at Boston's Business Forum. (Full title is I.T. WARS: Managing the Business-Technology Weave in the New Millennium).  For some free insight, check out his blog, 'The Business-Technology Weave'-you can Google to it, or search on the site IT Knowledge Exchange which hosts it.  Great stuff.

Reply

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.