Password policy

After my experiences today I’m reconsidering the way I look at password policies. I had to go around and install the new drivers for that Canon copier/printer today on about 15 machines. The install involved installing the Canon LPR port, installing the print driver, restarting, and then entering the Department ID information for the print job accounting functions. So I would sit down at a PC, run the installers, and ask the user to enter their password when the PC restarted. Most of them would just tell me what the password was instead of getting up from where they had settled to type it. A couple of these folks had to get up and type it in because they couldn’t remember it. Typing it in had become such a routine that they couldn’t tell you what it was, but they could type it. That told me two things:

1) I’m obviously not making them expire often enough. (I already knew that, but since there are no direct internet-facing PC’s, everything sits behind another company’s whole network infrastructure, and it’s a small enough environment that I can keep a pretty close eye on things, I have been more lax than I would be in any other situation. I don’t make them change it as often as most of you probably do with your users.)

2. You could never use social engineering to get these people’s passwords. They can’t tell you what they are! Maybe there’s something to be said for letting people type in the same password for long periods of time, making it such a routine that they can’t give it to anyone else. 🙂

Similar Posts

  • Movable Type Stuff

    I finally, after spending most of the last two nights and my lunch hour today, have MT installed, configured, tweaked and the entries all put back for the child abuse site. Some stuff is still broken, some stuff will remain broken, existing comments are gone, etc. Some stuff is better. Thanks to a link at…

  • He’s a coding fool..

    OK, good night’s sleep last night, mood much better, let’s get to blogging! 🙂 The coding fool I’m talking about, by the way is Josh, aka nf0. In the last few days he’s written a couple of really useful scripts, eBayTools, which lets you “take a list of items, search ebay, and create an RSS…

  • Funny holiday story

    So where I work, we allow attorneys to work from home on a pretty regular basis, we’ll even go ahead and set-up their machines for them to use a VPN connection to our network, and Remote Desktop to work directly from their office machine. We also require that they have a firewall installed if they…

  • A breakthrough?

    Maybe. I found another machine that sends emails like mine does. They always go through and they push or drag the other emails with them. Once I found that, it was simply a matter of figuring out what my machine and that one have in common that others don’t. Well, it’s one of the new…

  • |

    Linked – Say Farewell to SMS-Based Two-Factor Authentication?

    The U.S. National Institute for Standards and Technology (NIST) says in a new draft of its Digital Authentication Guideline that SMS-based two-factor authentication should not be used due to security concerns. “[Out of band verification] using SMS is deprecated, and will no longer be allowed in future releases of this guidance,” the documents reads. As…

  • What I’m Reading (weekly)

    Bloggers: Stop, Breathe, and Don’t Overreact to Facebook’s Changes | Crystal Ponti tags: MM SocNetPres Cluetrain: We have met the internet’s enemy, and he is us — Tech News and Analysis tags: MM 20 Bad Things Only People Who Work From Home Will Understand tags: MM Don’t fall for these adult learning myths tags: MM Training The NSA’s…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)