Two lists to be found here: http://patchmanagement.org/
patchmanagement, and wsus. Kurt On Tue, Apr 26, 2016 at 5:31 PM, Richard Stovall <rich...@gmail.com> wrote: > <Thread hijack> > > How does one subscribe to the fabled patch management list? > > </> > > On Tue, Apr 26, 2016 at 7:59 PM, Andrew S. Baker <asbz...@gmail.com> > wrote: > >> From the article: >> >> >> *>>For instance, we recommend using system monitoring tools that present >> users with information about the last login attempt, so they can see if >> they’re responsible for failed login attempts. <<* >> Do they really believe that if users are inconvenienced by password >> changes every 30 or 60 or 90 days, that they'll actually bother to match up >> their activities with information that indicates last login of the system? >> >> The fact that they could not point to an improved security posture by >> their new stance indicates its weakness. Let's see if they feel the same >> way about it in 5 or 6 months. >> >> The fact is, we are at a good point in computing history to go with >> changing passwords, since so many online services are doing it. Back when >> people only had an eternal bankcard pin and a changing corporate password, >> it would be easy to see how the changing password would be a huge annoyance. >> >> Today? Let's see how many users feel that identity theft is a worthwhile >> trade-off for password changing convenience, after they experience the >> former. >> >> If user convenience is the paramount consideration for information >> security, then it's hard to see what other authentication and authorization >> options will be deemed acceptable. >> -- Two-factor? Inconvenient. >> -- Digital certificates? Inconvenient. >> >> Reducing the scope of exposure is the primary purpose of changing >> passwords. >> >> *>>The new password may have been used elsewhere, and attackers can >> exploit this too.<< * >> A. Pure Speculation. >> B. There's nothing to prevent the current password from being used >> somewhere else, too. Frankly, if the next password a user selects is used >> somewhere else, then there is an equal chance that they will use their >> current password on the next service that they sign up for. They are just >> employing poor password hygiene and they are not only going to do so if the >> corporate password changes. >> >> >> *>>The new password is also more likely to be written down, which >> represents another vulnerability. <<* >> For any user that is likely to write down their next password, they are >> also likely to be reusing passwords across sites. See previous point. >> >> This means that their poor password practices are *already* endangering >> the current environment. >> >> >> *>>New passwords are also more likely to be forgotten, and this carries >> the productivity costs of users being locked out of their accounts, and >> service desks having to reset passwords.<<* >> >> Whine, whine, whine. The deployment of a self-service password portal >> eliminates this risk, and is not an uncommon solution. >> >> >> What has been offered here is not a reason or a set of reasons, but a set >> of ill-considered excuses. >> >> Anyhoo, it will be interesting what their guidance is next year... >> >> >> >> Regards, >> >> *ASB* >> *http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker>* >> >> *Providing Expert Technology Consulting Services for the SMB market…* >> >> * GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A >> >> >> >> On Mon, Apr 25, 2016 at 6:56 PM, Dave Lum <l...@ochin.org> wrote: >> >>> Anyone see the debate on the Patch management list, driven by this: >>> https://www.cesg.gov.uk/articles/problems-forcing-regular-password-expiry >>> >>> >>> >>> I don’t even know how it’s a debate other than the desired frequency (no >>> one-size-fits-all on that IMO). Even six months is far better than never. >>> With expiring passwords you at bare minimum mitigate employee’s that leave. >>> >>> >>> >>> *David Lum* >>> >>> *Systems Administrator III* >>> *P:** 503.943.2500 <503.943.2500>* >>> *E:** l...@ochin.org <l...@ochin.org>* >>> *A:** 1881 SW Naito Parkway, Portland, OR 97201* >>> >>> >>> [image: Facebook Link] <https://www.facebook.com/OCHINinc>[image: >>> Twitter Link] <https://twitter.com/ochininc>[image: Linkedin Link] >>> <http://www.linkedin.com/company/ochin> www.ochin.org >>> [image: OCHIN email] >>> >>> >>> >>> >>> >>> >>> >>> >>> >>> >>> Attention: Information contained in this message and or attachments is >>> intended only for the recipient(s) named above and may contain confidential >>> and or privileged material that is protected under State or Federal law. If >>> you are not the intended recipient, any disclosure, copying, distribution >>> or action taken on it is prohibited. If you believe you have received this >>> email in error, please contact the sender with a copy to >>> complia...@ochin.org, delete this email and destroy all copies. >>> >> >> >