Pretty much everyone knows that passwords aren’t supposed to be shared. Passwords exist to protect your information and your employer’s information from being seen by people who shouldn’t see it and who could cause serious damage if they do access it.
This is why you have a strong password on your banking information (you DO have a strong password on your bank account, don’t you?)
So how is it that Edward Snowden managed to get the passwords that gave him access to thousands of secret documents? According to a story from Reuters, Snowden did it in the easiest way possible. He asked for it.
But of course there’s more to it than that. What Snowden did was tell a couple dozen of his coworkers that he needed their passwords because he was a system administrator. Those coworkers, knowing that Snowden was fully cleared, figured it was safe, and gave him the passwords. Snowden used that trust to raid the NSA files for everything he could find.
Leaving aside the propriety of what Snowden did, the fact that he was able to get the information he did with other people’s login information speaks volumes. Perhaps more important, it speaks those volumes directly to you and your employer.
Snowden exploited a weakness that exists at nearly every company or organisation and which can be overcome only by having the right security policies and the right training. That weakness is trusting the wrong people at the wrong time.
The obvious question is how this applies to you and your organisation. After all, the chances are pretty good that you’re not sitting on a pile of state secrets. But the chances are that your company has plenty of information that has value to your competitors, to criminals, or to people who want to use that information for other dubious purposes. Do you really want the outside world to see your customer list? Your financial statements? Your supply chain or manufacturing details? Probably not.
Unfortunately, if you lose control of your organisation’s passwords, you’re allowing just that. But you can limit the problem by implementing some basic practices, making sure your staff is trained and then retrained frequently. Here are some things you can do:
It’s important to remember that maintaining access security requires the willing cooperation of your staff. This means that you have to tell them what needs to be protected, the means they should follow to protect that information and what they should do if they suspect that protection has been compromised, even by someone who claims a plausible reason to do so.
Here’s one way such a procedure might work: One of your workers with access to something sensitive, such as human resource data, requests help with a problem logging in to the network. Somebody from the help desk asks for the log-in credentials to see what the problem is and to try to fix it. The person being helped provides the information and then immediately sends an email to a designated manager saying something like this: “I provided my log-in info to Sam Smith from the help desk to fix a log-in problem. My extension is 123.”
Once the log-in problem is solved, the employee should immediately change their password. That change will be recorded by your network management system where it can be verified by a manager or security staffer. Will that eliminate all data loss? Of course not, but it will eliminate some of it. It requires little in the way of resources and it allows management follow-up since problems—including an administrator who seems to be asking for a lot of passwords—will show up quickly.
While you can throw automation at such a problem, at some point the most basic answer is training and management. It’s hard to be more effective than that unless you already have training and management practices to enforce password discipline in place already.
How well do you know security? Try our quiz and find out!
Originally published on eWeek.
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…
View Comments
This is a great article. I recommend using a password manager to keep the passwords safe as well as using the password manager to create strong passwords. I have been using RoboForm to generate passwords for me as well as keep my data safe for over 7 years.
This is a great article showing how easily credentials can be compromised. I also came here to suggest RoboForm by Siber Systems but am happy to see someone beat me to it, RoboForm generates statistically secure passwords but also stores them in a way that they are easily managed and changed while still being securely encrypted.
Despite the increase awareness, Snowden and other high profile cases show taht shared passwords represent a real problem in organization. If a network has the ability to prevent concurrent logins this decreases the likelihood of users sharing passwords as it impacts their own ability to access the network. Native Windows features cannot stop concurrent logins but a software called UserLock can. It provides users with the motivation to adhere to password security policy and help protect the organization’s critical assets.