ITauditSecurity
Skip to content
  • Home
  • About
  • Links
  • SiteMap
  • Twitter
  • Hidden
  • Copyright

Tag Archives: shoulder surf

by ITauditSecurity | March 31, 2010 · 7:16 am

Throw Password Rules Under the Bus?

I ran across Tom Olzak’s post where he quotes from an SANS article by Daniel Wesemann, Password rules: Change them every 25 years. I disagree with both of them on a few points.

First, Olzak notes in his introductory paragraph that

Continue reading →

Share this:

  • Click to print (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Skype (Opens in new window)

Like this:

Like Loading...

2 Comments

Filed under Security

Tagged as 30 60 90, brute force, change, complex, daniel wesemann, encrypted, hashed, keylogger, passphrase, password, phishing, sans, sharing, shoulder surf, social engineering, strong, tom olzak, two-factor, write down

  • Enter your email address to to be notified of new posts by email.

    Join 1,314 other subscribers
  • Quick Links

    New IT Auditors Start Here
    CISA
    ACL Tips
    Blogging Tips
    Excel: Basic Data Analytics
    Ask a Question
    Reader Poll: Who R U?

  • Recent Posts

    • Where’s Mack?
    • Most Popular Blog Posts of 2021
    • Shatter Silos to Identify More Risk
    • Software Components NOT Removed from Servers
    • ACL Table Already Open error message
    • My Favorite ACL Tricks
    • Quote: Not Concerned about General Ledger Changes
    • AI Marketing Failure/Follow-up Failure
    • Artificial Intelligence will NOT take over the World
    • 4 Common AI Fallacies
  • Top 7 Posts

    • Free Downloads
    • How to get an IT Audit job with little or no experience
    • FREE CISA Study Guide
    • How to Perform Population Validation
    • ACL: How to Add a Computed Field
    • PSPad: Great Text File Audit Tool
    • Top 10 Reasons Why Being an IT Auditor is So Hard
  • Categories

  • Links

    • * Follow ME on Twitter *
    • Hidden
    • IT/Audit/Security Resources
  • Blogroll

    • Audit Monkey (not real active) The life and times of an Internal Auditor
    • risk3sixty IT audit blog
    • SANS Handler's Diary Daily security pulse
    • Security Monkey (not active, but still good content) Great security blog
ITauditSecurity · IT audit/security/analytics/analysis, HOW-TOs, humor, and a whole lot more…
Website Powered by WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • ITauditSecurity
    • Join 765 other followers
    • Already have a WordPress.com account? Log in now.
    • ITauditSecurity
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: