On Thursday, 08/31/2006 at 12:13 CET, Phil Payne 
<[EMAIL PROTECTED]> wrote:
> The same undelete technology that works so well on Windows PCs also 
works with 
> smartphone
> memory.  Perhaps there's a case not only for controlled distribution of 
> passwords, but also
> for their controlled withdrawal.

And, more importantly, change.  I know of a large multinational IT company 
that has a 90-day password change policy, applying to system AND network 
access.  It doesn't close the window completely, of course, but it *does* 
reduce risk.
- How long since I changed my pw did I lose/throw away my smartphone?
- How long did it take someone to find it?
- How long did it take them to break into it?
- How long did it take them to figure out it it was worthwhile to try it?

Polices that suspend network/system access due to inactivity help as well.

"Sometimes you're the windshield; sometimes you're the bug."

Alan Altmark
z/VM Development
IBM Endicott

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to