|
Hackers break into corporate computer systems and release lists of usernames and passwords on the open web. Home PCs are vulnerable to malware, viruses and other tricks to access your personal, financial and private information. These have now become regular occurrences. The most common weakness in these types of hacks is the password. Passwords are a technology from a time when our computers were not inter-connected. The age of the password has come to an end.
|
No one method of biometric security is said to do the best job of protecting system access. When you consider biometric security, you want to select a physical characteristic that is constant and does not change over time, and are also difficult to fake or can be changed on purpose. You also need to consider that some biometric security metrics are consider more invasive than others (e.g. DNA vs. facial recognition). Some methods take a lot of time to execute, such as a retinal scan which can take as much as 15-30 seconds. In addition, ethical use issues have been raised over some of the biometric security metrics. The details of the methods and issues will not be addressed in this post.
Disconnected fobs are the most common type of security fob, and do not have a physical connection to the client’s computer. They use a built-in screen to display the generated authentication code, which the client manually enters via the keyboard. Bluetooth technology is also used as a disconnected fob.
Connected fobs must be physically connected to the client’s computer. Authentication is automatically performed once a physical connection is made, eliminating the need for the client to manually enter the authentication code. Smart card technology is also used as a connected fob.
- Is at least eight characters long
- Does not contain your user name, real name, or company name
- Does not contain a complete word
- Is significantly different from previous passwords
- Contains characters from each of the following four categories:
- Uppercase letters
- Lowercase letters
- Numbers
- Keyboard symbol characters (e.g. !@#$%, etc.)
I encourage you to leave a comment by clicking on “…comments” below…
David Schuchman
from BCNJ Member Blog Feed http://dlvr.it/7XPg0M
via IFTTT

