Battling the Pesky Password Problem

Passwords vs. Memory = The Risk

What is considered a strong password, and why does the strength of the password really matter that much. This brings us to another question; how do hackers gain access so effortlessly?

For anyone in the IT industry, in a recent quest to engineer secure systems, NIST (the National Institute for Standards and Technology) has been looking at the problem from several angles and updated their guidance related to authentication systems and password composition. The resultant advice and implications were shocking for some and a relief to others.

To find out more about extra security and being more vigilant about who’s sending you what, please click here, and register for the webinar. The famous speakers will be the Chief Hacking Officer – Kevin Mitnick, Roger Grimes, who is a Data-Driven Defense Evangelist, and Perry Carpenter, the Chief Evangelist and Strategy Officer.

Good to Know:

  • In the early 1960s, Fernando Corbató helped deploy the first known computer password.
  • He acknowledges the password’s flaws — there seems to be a major breach each month — and the public’s frustrations, having to remember strings of code for dozens of digital accounts. “Unfortunately it’s become kind of a nightmare,” he says.
  • But at 87 years old today, he isn’t sorry.
  • Rather, the retired researcher says, the move was pretty logical at the time. Mr. Corbató ran an early computing project at the Massachusetts Institute of Technology. For researchers to have their own accounts, there needed to be a way to separate them. (And give him some credit — no one has developed a widely adopted substitute to the password more than 50 years later.)
  • Source
  • Photo by Jason Dorfman, MIT CSAIL photographer – Permission solicited, CC BY-SA 3.0.

#onsgeeom #saltessentialit #fabilicious #ContentMarketer #Ovakwashiwana #TheSalesMajor