Thursday, May 19, 2011

5 Tips for Top-notch Password Security

by Kim Komando
used with permission from the
Microsoft Small Business website
Whether it's a few PCs or hundreds on your network, there's one thing that can separate your system from being compromised: a great password.
Why? Hackers want access to anything and everything. If they can guess your user name and password, you might as well have given them your wallet and the keys to your building.
Before we talk about what makes a good password, let's begin with the first of five things to know and practice in using passwords.
1. Don't be complacent: Attacks can and do happen.
Hackers are a devious bunch and will stop at nothing to get into your network and files. They use three different methods to get to you: brute force, dictionary attacks, and social engineering.
Brute force is the most time-consuming method. Basically, it involves a program that tries every combination of letters, numbers, and keyboard characters to guess your password. It starts with trying every character, then tries two-character combinations, and so on.
The longer the password is, the exponentially more difficult it becomes to crack. According to George Shaffer, a password expert, a password that is eight characters in length and utilizes lower- and upper-case letters, numbers, and keyboard characters won't be cracked for two years. This underscores the importance of being as random as possible when choosing your password. (More tips from Shaffer on creating passwords are available at www.geodsoft.com/howto/password ).
Another method of attack is through the use of custom dictionaries. These dictionaries are filled with words and names, but also number and letter combinations, such as 11111 and abc123. Simple passwords such as "duke" or "ilovemydog" can easily be guessed.
The third and most effective method of attack is social engineering. This involves someone with criminal intent soliciting a password directly from a user. Many people divulge their passwords to co-workers and strangers without even realizing it.
For example, most small businesses don't have a dedicated information-technology staff. A hacker posing as someone from your company's Internet service provider could call in and get an unsuspecting employee's password by "testing the service." The hacker might request the employee's user name and password to log in and test the connection from the ISP's end. If the hacker sounds authoritative and legitimate enough, your whole network could be compromised.
If your business rents space in a larger facility, strangers probably roam the hallways unnoticed. A few innocent questions or a watchful eye can be disastrous.
2. Know what makes for a bad password.
Because the attacks described above are becoming increasingly more common, you don't want to use anything in your password that's personal and easy to guess. Keep in mind the following don'ts:
•Don't use only letters or only numbers.
•Don't use names of spouses, children, girlfriends/boyfriends or pets.
•Don't use phone numbers, Social Security numbers or birthdates.
•Don't use the same word as your log-in, or any variation of it.
•Don't use any word that can be found in the dictionary — even foreign words.
•Don't use passwords with double letters or numbers.

Some of the worst passwords are: password, drowssap, admin, 123456, and the name of your company or department. Finally, never leave it blank. That's a surefire way to let the bad guys into your system.
3. Get proficient at creating good passwords.
A good password is one that is easy to remember but difficult to guess. That sounds like a paradox, but it's really not.
There are a couple of different ways to create difficult-to-crack passwords. One is substituting letters with characters and numbers. To make it easier on yourself, try to use numbers and characters that resemble the letters they are replacing.
For example, you would never want to use the word "password" as your password. If you change it to p@7sw0rd!, you've got something that would take some time to crack but is fairly simple to remember.
Another method is to use the first letters of the words in a favorite line of poetry or a verse of song. "Hail, hail the lucky ones, I refer to those in love" becomes "H,hTL0,IR2t1L."
The best passwords are at least eight characters in length and use a combination of numbers, keyboard characters and upper- and lower-case letters. The longer your password is, the longer it will take someone (or more likely, some program) to crack it.
4. By all means, safeguard your password.
At first, it may be difficult to remember your password. Did you substitute an "i" with a "1" or did you use a "1" to represent "L?" Most people will want to write the password on a piece of paper and place it underneath their keyboard or mouse pad. Or worse, they'll stick the password right on their monitor.
To help remember the password, use it immediately. Then log in and out several times the first day. Just don't change it on a Friday or right before leaving for vacation. You could write it out several times on a piece of paper. This helps record it in your mind. Just be sure to shred the paper when done.
Invariably, there may come a time when a password has to be shared. Let's say an employee is out of town to give a presentation but left the PowerPoint file on his desktop. You will have to get his user name and password to access that file. After you open the file, change the password and give him the new password upon his return. Then, as soon as the person gets back into the office, have him change the password again. Yes, it's a lot of work but well worth it.
5. Change your password often—as in several times a year.
Your network administrator can force your employees to change their password every so often. Microsoft recommends having users change their passwords every 30 to 90 days, but encourages you to go with the smaller number. I think 30 days is a reasonable number here. You always want to side with caution when it comes to sensitive information.
If you're like me, you allow your employees to do light surfing at lunch and on breaks. Encourage your employees to change their passwords to personal Web sites as well—such as to banking, Internet e-mail accounts, shopping sites, and so on. Advise them not to use the same password for all of their sites. A particularly good hacker can cause personal financial ruin by gaining access to one username and password.
Juggling all of these passwords is not easy. You might want to consider a program that can do all of this for you. Account Logon (www.accountlogon.com) and Roboform (www.roboform.com) are two well-reviewed password management programs; both offer free versions.
Now the following is an eerie thought — but it's something that must be taken into consideration.
What if you or your network administrator dies?
Well, if you've used best practices when creating a password, nobody else knows your password. And it's so complex that it could take months to crack the code or money to buy the right software for the job. Just in case, you might consider keeping a copy of all passwords in the company's safe. As for your personal passwords, keep them stowed away somewhere along with your will.

Thursday, October 7, 2010

10 Emails You Should Never Send
used with permission from the HP Small Business Center
Here’s a scenario most of us are familiar with, whether first-hand or as a witness to a colleague’s faux pas: an email with a crude joke or a funny picture that crosses into the personal-email realm is sent to a cluster of friendly internal contacts and accidentally included on the recipients’ list is the company CEO. Embarrassing for the sender? Yes. Grounds for dismissal? Unlikely.
What can prove far more detrimental to your career, however, is the way you compose your everyday emails. We often treat email communication in the same casual manner as we do informal telephone conversations, and it’s all too easy to forget that there’s a flawless digital record of what’s been communicated.
Unlike verbal conversations, emails can be forwarded to the wrong people. Likewise, if a message is written in a hurry, it can end up sloppy or leave itself open to misinterpretation and, as a result, it can have nasty repercussions. It’s always better to think before you send.
Convenient email enabled devices such as the Palm® smartphone and HP notebook also allow you to send emails from anywhere these days too, but it’s important to train yourself to send in “work mode”. Next time you reach for your smartphone, remember that you’re representing yourself and your company, no matter where you are.
10 email mistakes that could cost your job:
  • Emails sent after happy hour
    Company happy hour after work? It’s probably best to save the Palm responses for the next day and not to respond to emails from home after a night out.
     
  • Sarcasm and dry humor
    Email is not a good medium to convey the intricacies of sarcasm, and often it can be taken out of context — with disastrous repercussions.
     
  • Private matters
    Always better to separate business and pleasure — and using company resources for personal matters is generally a bad idea.
     
  • Professional criticisms
    If it’s a small thing, say it over the phone; otherwise it looks too official and can cause unnecessary worry. If it’s really bad, discuss it in person.
     
  • Personal remarks and gossip
    It’s very easy to treat email like water cooler conversation, but these emails can have a tendency to get ‘Forwarded’.
     
  • Angry responses
    It’s easy to fire off an angry response without thinking, but not always easy to retract it. Best to put a delay on your email if possible, or wait a day before you respond if you’re really that upset.
     
  • Bad language
    Most people just don’t do it, but for the few who do — it’s a terrible idea; swearing has no place in work emails.
     
  • Company or industry secrets
    This one may well get you sued as well as sacked. Most companies have a confidentiality agreement you sign at the beginning of your employment that would be violated in this case.
     
  • Racist/sexist language
    It’s best to avoid this in your everyday speech, as well as your work emails. Like the above, most people sign a zero-tolerance agreement which would be violated and such violations are grounds for termination.
     
  • Sloppy writing
    Even if it’s sent from your Palm while you’re at the beach, remember that your image is on the line.
Last but not least, if you work in government or other offices of interest to the general public, be extra cautious. Very abundant in the news are email leaks that get government and other official people in serious trouble.