ITauditSecurity
Skip to content
  • Home
  • About
  • Links
  • SiteMap
  • Twitter
  • Hidden
  • Copyright

Tag Archives: keylogger

by ITauditSecurity | March 31, 2010 · 7:16 am

Throw Password Rules Under the Bus?

I ran across Tom Olzak’s post where he quotes from an SANS article by Daniel Wesemann, Password rules: Change them every 25 years. I disagree with both of them on a few points.

First, Olzak notes in his introductory paragraph that

Continue reading →

Share this:

  • Click to print (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to email this to a friend (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Skype (Opens in new window)

Like this:

Like Loading...

2 Comments

Filed under Security

Tagged as 30 60 90, brute force, change, complex, daniel wesemann, encrypted, hashed, keylogger, passphrase, password, phishing, sans, sharing, shoulder surf, social engineering, strong, tom olzak, two-factor, write down

  • Enter your email address to to be notified of new posts by email.

    Join 1,291 other followers

  • Quick Links

    New IT Auditors Start Here
    CISA
    ACL Tips
    Blogging Tips
    Excel: Basic Data Analytics
    Ask a Question
    Reader Poll: Who R U?

  • Recent Posts

    • Another Nail in ACL’s Coffin
    • Critical Thinking? How about just Thinking?
    • Quote of the Weak – Auditor Judgment
    • Create a Help Desk for Data
    • Some Periodic Reviews Provide Little Assurance
    • Blogging about Internal Audit (10 tips)
    • Mack-the-Auditor Gets Audited! Part 3
    • Mack-the-Auditor Gets Audited! Part 2
    • Mack-the-Auditor Gets Audited! Part 1
    • Why this pic on this blog?
  • Top 7 Posts

    • ACL: How to Add a Conditional Computed Field
    • Is ACL Analytics Dying?
    • How to get an IT Audit job with little or no experience
    • Teach Yourself ACL
    • Free Downloads
    • ACL tip: Create a File Import Script
    • How to Audit User Access
  • Categories

  • Links

    • * Follow ME on Twitter *
    • Hidden
    • IT/Audit/Security Resources
  • Blogroll

    • Audit Monkey (not real active) The life and times of an Internal Auditor
    • risk3sixty IT audit blog
    • SANS Handler's Diary Daily security pulse
    • Security Monkey (not active, but still good content) Great security blog
ITauditSecurity · IT audit/security HOW-TOs, analysis, & humor
Website Powered by WordPress.com.
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
<span>%d</span> bloggers like this: