ILNews

Start Page: Protecting those pesky passwords is necessary evil

Kim Brand
January 4, 2012
Back to TopCommentsE-mailPrintBookmark and Share

StartPageBrand.jpgYou are bad at managing passwords. You may be a good attorney – but you share your passwords with other people, you use the same password on multiple systems, your password is too short or too simple or written on a Post-it note under your keyboard. The truth is: you don’t like passwords or complicated password policies and you don’t think a secure password is worth the trouble.

That was, until the consequences of a data breach made it worth the trouble. That day has come. In fact, that day came long ago. You’ve just been lucky.

Some data breaches are not the result of compromised passwords. Faulty software can expose private data. Your PC can get infected with a virus that delivers your files into the clutches of a server operated by organized crime. Your laptop can get stolen or an emBrand-010612.gifployee may lose your backup on the “thumb drive” he keeps with his keys. All these troubles may lead to data leaks – but cracked passwords are too common and indefensible; you can actually “fix” this source of leaks if you set your mind to it.

By changing your password often you can prevent someone who had access to your account today from having it tomorrow. Passwords that last forever may outlast relationships. Pick a cycle: change of seasons, start and end of school, national holidays or some other easily memorable way to mark the passage of time and use that event as a reminder to change your password.

Complex passwords don’t have to be complicated. With a few simple tricks you can make up passwords that are nearly impossible to guess but easy to remember.

• Use a mix of capital and lower case letters

• Use at least eight characters

• Use numbers and punctuation marks

• Use symbols: %, $, @, etc.

Tech Tip: you can substitute symbols that have a similar appearance:

@ = a

$ = s

0 (zero) for o (oh)

! or 1 for i

3 for e (note that it is just backwards, like: z for s

• Don’t use a word you could find in a dictionary

• Don’t use your name or anyone else’s

• Don’t use a sequence of numbers or letters: 1234 … or abcd … or a phone number

There are 70 times more combinations of nine characters than eight – so pick a longer password if possible.

Analysis of a data breach at a web services provider with millions of users uncovered that the most popular password used was “123456” – the second most popular: password. Don’t be a statistic!

One simple scheme to create a complex password is to join common words separated by special characters. The first part might be “Winter,” “Summer,” “Football,” or “Baseball.” The “season” will be obvious based on the time of year. Then separate them with a special character. For added security, substitute symbols for letters. Here is an example:

W!nter$2o12 – This substitutes 1 for i and o for 0.

If you use the same password everywhere then someone who guesses it will have access to everything. One trick is to add a prefix to identify which device or service the password is for. This way you don’t need to remember lots of passwords, but each one will still be unique.

• For your email: EMail#W!nter$2o12

• For your bank: Bank#W!nter$2o12

• For your computer: PC#W!nter$2o12

• For your Facebook account: FB#W!nter$2o12


Other password strategies include using the first initial of words in a short phrase or breaking up a phrase into parts. Here are five passwords based on a common phrase:


N!tTime4 Now is the time for

Allg00d$ All good

M3n2C0m! Men to come

2the@id0F To the Aid of

The1rC0untry Their Country

Safeguard your passwords. We’ve seen passwords written on whiteboards and collected in spreadsheets shared by everyone in a firm. The problem with shared passwords goes beyond information that may be shared with the wrong people. If someone has your password they can pretend to be you. One of our customer’s email accounts was hacked simply for the purpose of sending tens of thousands of messages that appeared to come from him.

Use a strong password for every system. Even a compromised Facebook account can lead to embarrassing consequences. If you employ people who use passwords make sure they comply with these rules too; and that goes double for IT consultants and other contractors that touch your systems.

Bill Gates famously decreed in 2004 that passwords were dead. There have been inroads made by so-called “two factor” solutions – those that combine something you “know” like a password and something you “have” like a digital “token” (the Yubi Key is my favorite) or something you “are” like a fingerprint – but logins and passwords remain ubiquitous and probably will for a long time.

Make a New Year’s resolution to create a simple password policy that protects your reputation and confidential materials – before you regret it!•

__________

Kim Brand is a technology expert and president of Computer Experts Inc., a 27-year-old IT services company in Indianapolis. He has presented to local and state bar audiences and written for West Publishing and the ILTA. Kim contributed to the “On-Premises” section of the recently released ILTSO.org legal technical standards, and he is the inventor of the FileSafe Server used by many law firms. He may be reached at Kim@ComputerExpertsIndy.com or by phone at 317-833-3000. The opinions expressed are the author’s.

ADVERTISEMENT

Post a comment to this story

COMMENTS POLICY
We reserve the right to remove any post that we feel is obscene, profane, vulgar, racist, sexually explicit, abusive, or hateful.
 
You are legally responsible for what you post and your anonymity is not guaranteed.
 
Posts that insult, defame, threaten, harass or abuse other readers or people mentioned in Indiana Lawyer editorial content are also subject to removal. Please respect the privacy of individuals and refrain from posting personal information.
 
No solicitations, spamming or advertisements are allowed. Readers may post links to other informational websites that are relevant to the topic at hand, but please do not link to objectionable material.
 
We may remove messages that are unrelated to the topic, encourage illegal activity, use all capital letters or are unreadable.
 

Messages that are flagged by readers as objectionable will be reviewed and may or may not be removed. Please do not flag a post simply because you disagree with it.

Sponsored by
ADVERTISEMENT
Subscribe to Indiana Lawyer
  1. Good riddance to this dangerous activist judge

  2. What is the one thing the Hoosier legal status quo hates more than a whistleblower? A lawyer whistleblower taking on the system man to man. That must never be rewarded, must always, always, always be punished, lest the whole rotten tree be felled.

  3. I want to post this to keep this tread alive and hope more of David's former clients might come forward. In my case, this coward of a man represented me from June 2014 for a couple of months before I fired him. I knew something was wrong when he blatantly lied about what he had advised me in my contentious and unfortunate divorce trial. His impact on the proceedings cast a very long shadow and continues to impact me after a lengthy 19 month divorce. I would join a class action suit.

  4. The dispute in LB Indiana regarding lake front property rights is typical of most beach communities along our Great Lakes. Simply put, communication to non owners when visiting the lakefront would be beneficial. The Great Lakes are designated navigational waters (including shorelines). The high-water mark signifies the area one is able to navigate. This means you can walk, run, skip, etc. along the shores. You can't however loiter, camp, sunbath in front of someones property. Informational signs may be helpful to owners and visitors. Our Great Lakes are a treasure that should be enjoyed by all. PS We should all be concerned that the Long Beach, Indiana community is on septic systems.

  5. Dear Fan, let me help you correct the title to your post. "ACLU is [Left] most of the time" will render it accurate. Just google it if you doubt that I am, err, "right" about this: "By the mid-1930s, Roger Nash Baldwin had carved out a well-established reputation as America’s foremost civil libertarian. He was, at the same time, one of the nation’s leading figures in left-of-center circles. Founder and long time director of the American Civil Liberties Union, Baldwin was a firm Popular Fronter who believed that forces on the left side of the political spectrum should unite to ward off the threat posed by right-wing aggressors and to advance progressive causes. Baldwin’s expansive civil liberties perspective, coupled with his determined belief in the need for sweeping socioeconomic change, sometimes resulted in contradictory and controversial pronouncements. That made him something of a lightning rod for those who painted the ACLU with a red brush." http://www.harvardsquarelibrary.org/biographies/roger-baldwin-2/ "[George Soros underwrites the ACLU' which It supports open borders, has rushed to the defense of suspected terrorists and their abettors, and appointed former New Left terrorist Bernardine Dohrn to its Advisory Board." http://www.discoverthenetworks.org/viewSubCategory.asp?id=1237 "The creation of non-profit law firms ushered in an era of progressive public interest firms modeled after already established like the National Association for the Advancement of Colored People ("NAACP") and the American Civil Liberties Union ("ACLU") to advance progressive causes from the environmental protection to consumer advocacy." https://en.wikipedia.org/wiki/Cause_lawyering

ADVERTISEMENT