Password Overload Syndrome – The Latest Disorder Ravaging The IT Industry
by Calum MacLeod - Senior Consultant for Cyber-Ark - Thursday, 9 December 2004.
The most effective way to reduce the potential hazards of administrators suffering from “password overload syndrome” is to apply an effective policy, which should at the very least include the following components:
  • Centralised administration: Often, different IT groups control different pockets of passwords. It's important to take steps to create a centralised policy, procedures and enforcement mechanism. Otherwise, there is no way to ensure that each business or technical unit is doing its best to protect the keys to the kingdom.
  • Secure storage: Administrative passwords should be securely stored in a way that offers strong authentication, granular access control, encryption and auditing to safeguard every password.
  • Worldwide secure availability: At the same time, remote access is also critical. With today's distributed enterprises, administrators need access beyond network boundaries, where they can securely access and share passwords from anywhere within or outside the enterprise network.
  • A dual-control mechanism: This would require two or more administrators to access passwords to the most sensitive or vulnerable servers.
  • Routinely change passwords and track history: In addition to secure storage, the only way to ensure the long-term security of passwords is to alter them routinely.
  • Intuitive auditing: As passwords are used, changed or added, organisations will need to audit the whereabouts and use of passwords without poring over log files. Regulatory compliance measures are also driving routine auditing and tracking of access to vital systems.
  • Disaster recovery plan: Administrative accounts play a major role in recovering from incidents that range from a simple problem to a full off-site disaster recovery. Look into technologies for automated, safe replication of vital administrative information that can guarantee the availability of those accounts in time of need.
  • Provide a "safe haven" or vault within the network where all administrative passwords can be securely archived, transferred and shared among IT staff, on-call administrators, as well as administrators in the field.
My advice to my doctor and pharmacist is keep smiling – it’s the best therapy! For those IT guys there is a light and hope at the end of the tunnel - “password overload syndrome” can be beaten with new treatment – it comes down to putting the right measures and products in place for the fog to disappear and a clear conscious to emerge, once it does, they’ll find those passwords are safe and secure tucked up where no-one else can get to them apart from the guys who need to.

Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victim’s financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if you’re using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //