FYI it’s moderated..so there is a tiny delay before your posts show up.

From: listsadmin@lists.myitforum.com [mailto:listsadmin@lists.myitforum.com] On 
Behalf Of Richard Stovall
Sent: Tuesday, April 26, 2016 9:06 PM
To: ntsys...@lists.myitforum.com
Subject: Re: [NTSysADM] Password expiring debate on patch management

That was a little bit too easy.

(Thanks!)

On Tue, Apr 26, 2016 at 8:49 PM, Susan Bradley 
<sbrad...@pacbell.net<mailto:sbrad...@pacbell.net>> wrote:
http://www.patchmanagement.org/

Go there and sign up.


On 4/26/2016 5:31 PM, Richard Stovall wrote:
<Thread hijack>

How does one subscribe to the fabled patch management list?

</>

On Tue, Apr 26, 2016 at 7:59 PM, Andrew S. Baker 
<asbz...@gmail.com<mailto:asbz...@gmail.com> 
<mailto:asbz...@gmail.com<mailto:asbz...@gmail.com>>> wrote:

    From the article:

    /*>>For instance, we recommend using system monitoring tools that
    present users with information about the last login attempt, so
    they can see if they’re responsible for failed login attempts. <<
    */
    Do they really believe that if users are inconvenienced by
    password changes every 30 or 60 or 90 days, that they'll actually
    bother to match up their activities with information that
    indicates last login of the system?

    The fact that they could not point to an improved security posture
    by their new stance indicates its weakness.  Let's see if they
    feel the same way about it in 5 or 6 months.

    The fact is, we are at a good point in computing history to go
    with changing passwords, since so many online services are doing
    it.  Back when people only had an eternal bankcard pin and a
    changing corporate password, it would be easy to see how the
    changing password would be a huge annoyance.

    Today?  Let's see how many users feel that identity theft is a
    worthwhile trade-off for password changing convenience, after they
    experience the former.

    If user convenience is the paramount consideration for information
    security, then it's hard to see what other authentication and
    authorization options will be deemed acceptable.
    -- Two-factor?  Inconvenient.
    -- Digital certificates? Inconvenient.

    Reducing the scope of exposure is the primary purpose of changing
    passwords.

    */>>The new password may have been used elsewhere, and attackers
    can exploit this too.<< /*

    A. Pure Speculation.
    B. There's nothing to prevent the current password from being used
    somewhere else, too.  Frankly, if the next password a user selects
    is used somewhere else, then there is an equal chance that they
    will use their current password on the next service that they sign
    up for. They are just employing poor password hygiene and they are
    not only going to do so if the corporate password changes.


    */>>The new password is also more likely to be written down, which
    represents another vulnerability. <</*

    For any user that is likely to write down their next password,
    they are also likely to be reusing passwords across sites.  See
    previous point.

    This means that their poor password practices are *already*
    endangering the current environment.


    */>>New passwords are also more likely to be forgotten, and this
    carries the productivity costs of users being locked out of their
    accounts, and service desks having to reset passwords.<</*


    Whine, whine, whine.  The deployment of a self-service password
    portal eliminates this risk, and is not an uncommon solution.


    What has been offered here is not a reason or a set of reasons,
    but a set of ill-considered excuses.

    Anyhoo, it will be interesting what their guidance is next year...



    Regards,

    ***ASB*
    **_http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker>_

    ***Providing Expert Technology Consulting Services for the SMB
    market…*

    * GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A



    On Mon, Apr 25, 2016 at 6:56 PM, Dave Lum 
<l...@ochin.org<mailto:l...@ochin.org>
    <mailto:l...@ochin.org<mailto:l...@ochin.org>>> wrote:

        Anyone see the debate on the Patch management list, driven by
        this:
        
https://www.cesg.gov.uk/articles/problems-forcing-regular-password-expiry

        I don’t even know how it’s a debate other than the desired
        frequency (no one-size-fits-all on that IMO). Even six months
        is far better than never. With expiring passwords you at bare
        minimum mitigate employee’s that leave.

        *David Lum*

        */Systems Administrator III/**
        **P:**503.943.2500<tel:503.943.2500> 
<tel:503.943.2500<tel:503.943.2500>>**
        **E:**l...@ochin.org<mailto:l...@ochin.org> 
<mailto:l...@ochin.org<mailto:l...@ochin.org>>**
        **A:**1881 SW Naito Parkway, Portland, OR 97201***


        Facebook Link <https://www.facebook.com/OCHINinc>Twitter Link
        <https://twitter.com/ochininc>Linkedin Link
        
<http://www.linkedin.com/company/ochin>www.ochin.org<http://www.ochin.org>
        <https://www.ochin.org/>
        OCHIN email

        Attention: Information contained in this message and or
        attachments is intended only for the recipient(s) named above
        and may contain confidential and or privileged material that
        is protected under State or Federal law. If you are not the
        intended recipient, any disclosure, copying, distribution or
        action taken on it is prohibited. If you believe you have
        received this email in error, please contact the sender with a
        copy to complia...@ochin.org<mailto:complia...@ochin.org> 
<mailto:complia...@ochin.org<mailto:complia...@ochin.org>>,
        delete this email and destroy all copies.





Reply via email to