Do the same as the cryptography itself, which serves to make the
system orders of magnitude more expensive to crack than the value of
the data secured...
Choose a master password too outlandishly annoying to enter or speak:
o(O|(l1__|a8Bbq`bB0fvF'|lpsO or the like.  Then, simply write network
egress and Exchange transport rules that look for the last five
characters in email or IM and automatically start an HR termination on
the sender.  Easy!

--Steve

On Mon, Jun 4, 2012 at 12:22 PM, David Lum <[email protected]> wrote:
> In our case it was the administrative PGP encryption password that would let
> you log in to any encrypted system. Our Service Desk would occasionally hand
> it out to users instead of going through an extended rigmarole to get in
> themselves: Make it something embarrassing to say!
>
>
>
> I did this a few months ago and it has worked wonders…I am certain they
> haven’t handed it out to anyone, but  J
>
> David Lum
> Systems Engineer // NWEATM
> Office 503.548.5229 // Cell (voice/text) 503.267.9764
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to