<Thread hijack>

How does one subscribe to the fabled patch management list?

</>

On Tue, Apr 26, 2016 at 7:59 PM, Andrew S. Baker <asbz...@gmail.com> wrote:

> From the article:
>
>
> *>>For instance, we recommend using system monitoring tools that present
> users with information about the last login attempt, so they can see if
> they’re responsible for failed login attempts. <<*
> Do they really believe that if users are inconvenienced by password
> changes every 30 or 60 or 90 days, that they'll actually bother to match up
> their activities with information that indicates last login of the system?
>
> The fact that they could not point to an improved security posture by
> their new stance indicates its weakness.  Let's see if they feel the same
> way about it in 5 or 6 months.
>
> The fact is, we are at a good point in computing history to go with
> changing passwords, since so many online services are doing it.  Back when
> people only had an eternal bankcard pin and a changing corporate password,
> it would be easy to see how the changing password would be a huge annoyance.
>
> Today?  Let's see how many users feel that identity theft is a worthwhile
> trade-off for password changing convenience, after they experience the
> former.
>
> If user convenience is the paramount consideration for information
> security, then it's hard to see what other authentication and authorization
> options will be deemed acceptable.
> -- Two-factor?  Inconvenient.
> -- Digital certificates? Inconvenient.
>
> Reducing the scope of exposure is the primary purpose of changing
> passwords.
>
> *>>The new password may have been used elsewhere, and attackers can
> exploit this too.<< *
> A. Pure Speculation.
> B. There's nothing to prevent the current password from being used
> somewhere else, too.  Frankly, if the next password a user selects is used
> somewhere else, then there is an equal chance that they will use their
> current password on the next service that they sign up for. They are just
> employing poor password hygiene and they are not only going to do so if the
> corporate password changes.
>
>
> *>>The new password is also more likely to be written down, which
> represents another  vulnerability. <<*
> For any user that is likely to write down their next password, they are
> also likely to be reusing passwords across sites.  See previous point.
>
> This means that their poor password practices are *already* endangering
> the current environment.
>
>
> *>>New passwords are also more likely to be forgotten, and this carries
> the productivity costs of users being locked out of their accounts, and
> service desks having to reset passwords.<<*
>
> Whine, whine, whine.  The deployment of a self-service password portal
> eliminates this risk, and is not an uncommon solution.
>
>
> What has been offered here is not a reason or a set of reasons, but a set
> of ill-considered excuses.
>
> Anyhoo, it will be interesting what their guidance is next year...
>
>
>
> Regards,
>
>  *ASB*
>  *http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker>*
>
>  *Providing Expert Technology Consulting Services for the SMB market…*
>
> * GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A
>
>
>
> On Mon, Apr 25, 2016 at 6:56 PM, Dave Lum <l...@ochin.org> wrote:
>
>> Anyone see the debate on the Patch management list, driven by this:
>> https://www.cesg.gov.uk/articles/problems-forcing-regular-password-expiry
>>
>>
>>
>> I don’t even know how it’s a debate other than the desired frequency (no
>> one-size-fits-all on that IMO). Even six months is far better than never.
>> With expiring passwords you at bare minimum mitigate employee’s that leave.
>>
>>
>>
>> *David Lum*
>>
>> *Systems Administrator III*
>> *P:** 503.943.2500 <503.943.2500>*
>> *E:** l...@ochin.org <l...@ochin.org>*
>> *A:** 1881 SW Naito Parkway, Portland, OR 97201*
>>
>>
>> [image: Facebook Link] <https://www.facebook.com/OCHINinc>[image:
>> Twitter Link] <https://twitter.com/ochininc>[image: Linkedin Link]
>> <http://www.linkedin.com/company/ochin> www.ochin.org
>> [image: OCHIN email]
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> Attention: Information contained in this message and or attachments is
>> intended only for the recipient(s) named above and may contain confidential
>> and or privileged material that is protected under State or Federal law. If
>> you are not the intended recipient, any disclosure, copying, distribution
>> or action taken on it is prohibited. If you believe you have received this
>> email in error, please contact the sender with a copy to
>> complia...@ochin.org, delete this email and destroy all copies.
>>
>
>

Reply via email to