That was a little bit too easy. (Thanks!)
On Tue, Apr 26, 2016 at 8:49 PM, Susan Bradley <sbrad...@pacbell.net> wrote: > http://www.patchmanagement.org/ > > Go there and sign up. > > > On 4/26/2016 5:31 PM, Richard Stovall wrote: > >> <Thread hijack> >> >> How does one subscribe to the fabled patch management list? >> >> </> >> >> On Tue, Apr 26, 2016 at 7:59 PM, Andrew S. Baker <asbz...@gmail.com >> <mailto:asbz...@gmail.com>> wrote: >> >> From the article: >> >> /*>>For instance, we recommend using system monitoring tools that >> present users with information about the last login attempt, so >> they can see if they’re responsible for failed login attempts. << >> */ >> Do they really believe that if users are inconvenienced by >> password changes every 30 or 60 or 90 days, that they'll actually >> bother to match up their activities with information that >> indicates last login of the system? >> >> The fact that they could not point to an improved security posture >> by their new stance indicates its weakness. Let's see if they >> feel the same way about it in 5 or 6 months. >> >> The fact is, we are at a good point in computing history to go >> with changing passwords, since so many online services are doing >> it. Back when people only had an eternal bankcard pin and a >> changing corporate password, it would be easy to see how the >> changing password would be a huge annoyance. >> >> Today? Let's see how many users feel that identity theft is a >> worthwhile trade-off for password changing convenience, after they >> experience the former. >> >> If user convenience is the paramount consideration for information >> security, then it's hard to see what other authentication and >> authorization options will be deemed acceptable. >> -- Two-factor? Inconvenient. >> -- Digital certificates? Inconvenient. >> >> Reducing the scope of exposure is the primary purpose of changing >> passwords. >> >> */>>The new password may have been used elsewhere, and attackers >> can exploit this too.<< /* >> >> A. Pure Speculation. >> B. There's nothing to prevent the current password from being used >> somewhere else, too. Frankly, if the next password a user selects >> is used somewhere else, then there is an equal chance that they >> will use their current password on the next service that they sign >> up for. They are just employing poor password hygiene and they are >> not only going to do so if the corporate password changes. >> >> >> */>>The new password is also more likely to be written down, which >> represents another vulnerability. <</* >> >> For any user that is likely to write down their next password, >> they are also likely to be reusing passwords across sites. See >> previous point. >> >> This means that their poor password practices are *already* >> endangering the current environment. >> >> >> */>>New passwords are also more likely to be forgotten, and this >> carries the productivity costs of users being locked out of their >> accounts, and service desks having to reset passwords.<</* >> >> >> Whine, whine, whine. The deployment of a self-service password >> portal eliminates this risk, and is not an uncommon solution. >> >> >> What has been offered here is not a reason or a set of reasons, >> but a set of ill-considered excuses. >> >> Anyhoo, it will be interesting what their guidance is next year... >> >> >> >> Regards, >> >> ***ASB* >> **_http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker>_ >> >> ***Providing Expert Technology Consulting Services for the SMB >> market…* >> >> * GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A >> >> >> >> On Mon, Apr 25, 2016 at 6:56 PM, Dave Lum <l...@ochin.org >> <mailto:l...@ochin.org>> wrote: >> >> Anyone see the debate on the Patch management list, driven by >> this: >> >> https://www.cesg.gov.uk/articles/problems-forcing-regular-password-expiry >> >> I don’t even know how it’s a debate other than the desired >> frequency (no one-size-fits-all on that IMO). Even six months >> is far better than never. With expiring passwords you at bare >> minimum mitigate employee’s that leave. >> >> *David Lum* >> >> */Systems Administrator III/** >> **P:**503.943.2500 <tel:503.943.2500>** >> **E:**l...@ochin.org <mailto:l...@ochin.org>** >> **A:**1881 SW Naito Parkway, Portland, OR 97201*** >> >> >> Facebook Link <https://www.facebook.com/OCHINinc>Twitter Link >> <https://twitter.com/ochininc>Linkedin Link >> <http://www.linkedin.com/company/ochin>www.ochin.org >> <https://www.ochin.org/> >> OCHIN email >> >> Attention: Information contained in this message and or >> attachments is intended only for the recipient(s) named above >> and may contain confidential and or privileged material that >> is protected under State or Federal law. If you are not the >> intended recipient, any disclosure, copying, distribution or >> action taken on it is prohibited. If you believe you have >> received this email in error, please contact the sender with a >> copy to complia...@ochin.org <mailto:complia...@ochin.org>, >> delete this email and destroy all copies. >> >> >> >> > > >