User stages

Sep 18, 2019 7:38 AM

stone30

Views

704394

Likes

3064

Dislikes

73

password

access_control

user

iso27001

no_limits

I find this relevant, because I've been configuring a server (mostly compiling stuff) for the past two days. It's all abandonware on it.

6 years ago | Likes 1 Dislikes 0

Ass holes will get through anything.

6 years ago | Likes 2 Dislikes 0

As a fat man, can relate

6 years ago | Likes 2 Dislikes 0

You want Shadow IT? This is how you get Shadow IT.

6 years ago | Likes 1 Dislikes 0

As a data scientist my arch nemesis are network security people. For all you assholes out there from the bottom of heart FU <3

6 years ago | Likes 1 Dislikes 0

I'm currently using a home device tethered through my phone to work because my employers didn't consider 'getting anything done' a priority.

6 years ago | Likes 2 Dislikes 0

6 years ago | Likes 1 Dislikes 0

I have no idea what the video is meant to illustrate, but I enjoyed watching it nonetheless.

6 years ago | Likes 2 Dislikes 0

6 years ago | Likes 394 Dislikes 0

Shit, we should just use cats to illustrate everything.

6 years ago | Likes 4 Dislikes 0

So if you have a small pussy you can break into the internet? Cool!

6 years ago | Likes 2 Dislikes 0

SO MUCH YES! THIS is why I left the IT admin world after about 7 years. That and it's a thankless job with shit pay

6 years ago | Likes 1 Dislikes 0

What’s a DLP?

5 years ago | Likes 1 Dislikes 0

C h O n K y B o I

6 years ago | Likes 1 Dislikes 0

That’s one heckin’ chonk!

6 years ago | Likes 1 Dislikes 0

Got a pet gate to keep my cat out of a room. He knocked it over. I secured it. MFW he jumped over it...

6 years ago | Likes 1 Dislikes 0

This is EA's DRM isn't it?

6 years ago | Likes 9 Dislikes 1

6 years ago | Likes 161 Dislikes 0

Maru is too patient ;)

6 years ago | Likes 12 Dislikes 0

OH god this speaks to me.

6 years ago | Likes 1 Dislikes 0

Do security people realize the harsher the security the more likely people will look for exploits, to make it usable again?

6 years ago | Likes 5 Dislikes 0

We just had an email compromised this morning sending out the usual click this crap.

6 years ago | Likes 1 Dislikes 0

I work at an MSP and we've had a couple of clients get there emails hacked and forwarded to someone else with bank info, etc. 1/2

6 years ago | Likes 2 Dislikes 0

yeah, those hackers got some money out of it, bunch of bitches

6 years ago | Likes 2 Dislikes 0

6 years ago | Likes 46 Dislikes 0

6 years ago | Likes 5 Dislikes 0

this user is getting tired of your shit

6 years ago | Likes 4 Dislikes 0

I’m not sure what this is about but my computer guru husband will explain it to me. Really funny tho!

6 years ago | Likes 2 Dislikes 0

I couldn‘t give you more than one upvote so i upvoted all comments.

6 years ago | Likes 9 Dislikes 0

*cries in IT*

6 years ago | Likes 8 Dislikes 0

Are you saying these policys arnt effective or that users will try work around them?

6 years ago | Likes 479 Dislikes 3

Yes

6 years ago | Likes 98 Dislikes 0

No matter what checks you put in place, a user will always try to find a shortcut to get around them.

6 years ago | Likes 11 Dislikes 0

The authors' point is eventually it was cause the user to abandon the platform entirely, like I did to fucking pinterest just for making me

6 years ago | Likes 7 Dislikes 0

login.

6 years ago | Likes 5 Dislikes 0

"Stop using Netflix, we're trying to gain trusted status with our new parent company." -IT Manager Circa 2012

6 years ago | Likes 3 Dislikes 0

We had similar at one point. Except we had to point it many of the services they had issue with were our customers. (including porn) ...we

6 years ago | Likes 1 Dislikes 0

...in sales & support needed to access, some that we had in house. After Corp HR/Legal’s heads exploded...we all got new consent forms. :)

6 years ago | Likes 1 Dislikes 0

stronger security makes it more difficult for the user to use the intended services. if you go too far the user will try to circumvent.

6 years ago | Likes 14 Dislikes 0

Not gonna lie ... when we integrated an active token system it helped a ton.

6 years ago | Likes 2 Dislikes 0

I don’t mind these as long as I can keep my yubikey for it...

6 years ago | Likes 2 Dislikes 0

That's the worst part, it's great but requires people to not be idiots, a timed lockout helps but ultimately tokens rely on user to secure.

6 years ago | Likes 1 Dislikes 0

Yeah. We basically require they be kept on your keychain. (I know one guy that has it on a USB extension taped underneath his desk though.)

6 years ago | Likes 1 Dislikes 0

...but eventually that will go away because of the people the don’t remove them when the leave for the day...

6 years ago | Likes 2 Dislikes 0

Our cyber-environment is dangerous. It's too easy to defeat necessary security measures by using unsecured devices.

6 years ago | Likes 73 Dislikes 0

Not if it's carefully designed to prevent those devices getting to anything secure without going through something that adds protection

6 years ago | Likes 2 Dislikes 1

Ya’ll should give Darknet Diaries a listen. Cracking podcast about IT security, social engineering and how stupid people are.

6 years ago | Likes 2 Dislikes 0

Not if it's carefully designed to prevent those devices getting to anything secure without going through something that adds protection

6 years ago | Likes 5 Dislikes 0

Any defense mechanism can be defeated given enough time and expertise. It's about slowing things down in order to detect and stop the action

6 years ago | Likes 14 Dislikes 0

Exactly, make it time-consuming and/or expensive to compromise.

6 years ago | Likes 4 Dislikes 0

Not like that they aren't!

6 years ago | Likes 3 Dislikes 0

He is saying that cats are liquids

6 years ago | Likes 243 Dislikes 0

Cats do not abide by the laws of physics, okay?

6 years ago | Likes 2 Dislikes 0

I am glad someone has the courafe to stand up and speak out sbout the real issues.

6 years ago | Likes 8 Dislikes 0

You take that back!

6 years ago | Likes 2 Dislikes 0

[deleted]

[deleted]

6 years ago (deleted Jun 11, 2024 1:39 PM) | Likes 0 Dislikes 0

Even worse, some very good employees eventually “give up” when their job becomes to annoying to just do, and became a clock puncher...

6 years ago | Likes 2 Dislikes 0

Also, having four services the user needs to log into, which check that you don't use the same password for all. What's single-sign-on?

6 years ago | Likes 4 Dislikes 0

[deleted]

[deleted]

6 years ago (deleted Jun 11, 2024 1:40 PM) | Likes 0 Dislikes 0

.... i do.

6 years ago | Likes 2 Dislikes 0

Year? You mean 85 days.

6 years ago | Likes 8 Dislikes 0

85 days? I think you mean 60 day with lockout of the last 16 passwords used and minimum of special characters and numerals nlt 16 char long

6 years ago | Likes 4 Dislikes 0

That’s the policy at my work. Everyone just increments a number in the password, but it’s still a pain in the ass. I’m up to 45 now.

6 years ago | Likes 2 Dislikes 0

Here I am, a chump generating a new random password with LastPass every 90 days and then forcing myself to memorize it.

6 years ago | Likes 2 Dislikes 0

Set strong password requirements and you will probably find the passwords written on sticky notes stuck to monitors across the office.

6 years ago | Likes 7 Dislikes 0

If you set "strong" password requirements, yes. The more stuff I have to include in my password, the easier it gets to crack.

6 years ago | Likes 4 Dislikes 0

Let me do whatever I want and I'll have a 40-character string of nonsense that I don't need to write down.

6 years ago | Likes 6 Dislikes 0

This...max password lengths are super frustrating.

6 years ago | Likes 2 Dislikes 0

They are effective until you use a home device improperly.

6 years ago | Likes 3 Dislikes 0

Both

6 years ago | Likes 1 Dislikes 0

Some actually make your environment even less secure. Most security people don't think in large scale computing and put pieces together...

6 years ago | Likes 6 Dislikes 0

My favorite one where I work is we log every user name success or failure. Good. We set policy where computers don't store user names....

6 years ago | Likes 5 Dislikes 0

Most people screw up type password into username field, hit enter, fails they realize it log in with user name. We now have a log of..

6 years ago | Likes 5 Dislikes 0

passwords followed by successful log ins of user name. These policies by themselves. Good. Combined, Bad. More security = Less sometimes.

6 years ago | Likes 5 Dislikes 0

True

6 years ago | Likes 1 Dislikes 0

I've personally always hated passwords requirements, such as "must have a symbol". That kind of stuff actually *reduces* the possibilities!

6 years ago | Likes 11 Dislikes 2

It's the ones with the super arbitrary requirements or lock you out and don't tell you looking at you Apple.

6 years ago | Likes 2 Dislikes 0

It reduces the number of possible passwords to a still insanely large number while eliminating dictionary attacks.

6 years ago | Likes 7 Dislikes 1

I would say simple attempt/timed lock-out has largely derailed true brute-force methods but they aren't something to be ignored.

6 years ago | Likes 2 Dislikes 0

People are lazy though. So I suspect it it made passwords over all more varied.

6 years ago | Likes 1 Dislikes 0

It does not reduce the posibilites of the passwords you create, and when done right it makes your pw stronger.

6 years ago | Likes 1 Dislikes 3

Only if you use a password manager. My aunt's mail password for example is , because she can remember that.

6 years ago | Likes 2 Dislikes 0

Only makes it stronger against brute force attacks, complexity is irrelevant against phished and stolen passwords though, which seems to be>

6 years ago | Likes 6 Dislikes 0

That is true, but most stolen passwords are stolen as a hash and not as plain text. This means that complexity does make a difference.

6 years ago | Likes 1 Dislikes 0

one of the larger problems these days.

6 years ago | Likes 4 Dislikes 0

That's not how math works.

6 years ago | Likes 1 Dislikes 0

If you *have to* put a symbol in, most people will have it either at the beginning or the end. So for a first run, only look for them there.

6 years ago | Likes 1 Dislikes 0

Similar with numbers, they'll either be at the end or as leetspeak-replacement in a word.

6 years ago | Likes 1 Dislikes 0

Sure, the usage is pretty predictable, but you still have to account for those possibilities, password and passw0rd and p@ssword, that >

6 years ago | Likes 1 Dislikes 0

does increase the possibilities you have to try, even if not by a ton, I'm only pointing out it's not a reduction, I am very familiar with >

6 years ago | Likes 1 Dislikes 0

It sort of does. If there are too many rules passwords get predictable.

6 years ago | Likes 3 Dislikes 0

Sure, people tend to use them really predictably, but simply speaking of possibilities just adding a single digit at the end means >

6 years ago | Likes 1 Dislikes 0

trying every combination you would have tried all over again with 0 through 9, assuming a brute force. It multiplies

6 years ago | Likes 1 Dislikes 0

the number of possibilities by 10. Sure a brute force is likely going to start with dictionary first so a simple word + 1 digit is worthless

6 years ago | Likes 1 Dislikes 0

+1 for Maru

6 years ago | Likes 132 Dislikes 2

I love Maru so much

6 years ago | Likes 7 Dislikes 0

...that.....?

6 years ago | Likes 1 Dislikes 0

It's honestly the most normal looking, but recognisable, cat in my life

6 years ago | Likes 12 Dislikes 0

6 years ago | Likes 20 Dislikes 0

Is that Hana when she was still a kitten?

6 years ago | Likes 8 Dislikes 0

Yes : )

6 years ago | Likes 2 Dislikes 0

Ah yes rotating passwords, gotta love having 3 sets of routinely changing passwords. No way people are gonna use incremental changes.

6 years ago | Likes 37 Dislikes 0

This is the shit that turns Grandma'sOatmealRaisinCookies into Password!2019.

6 years ago | Likes 6 Dislikes 0

Img4r12. Time to change password... img4r13

6 years ago | Likes 7 Dislikes 0

1qaz2wsx

6 years ago | Likes 1 Dislikes 0

No way spyware from ads here on cat websites can ever collect your password as you type it.

6 years ago | Likes 4 Dislikes 0

Why would I be enter my password to login my system while I'm logged into the system to check on cat memes?

6 years ago | Likes 4 Dislikes 0

It's not this password they harvest. They want your other passwords. Some people keep 10 - 100 browsers open and key loggers can sit in ads.

6 years ago | Likes 2 Dislikes 0

Thats why MS is dropping the password expiration policies. At work our passwords are viable for 1 1/2 years. Otherwise its just unsecure

6 years ago | Likes 3 Dislikes 0

Yeah, but thats if its combined with other features, like 15 characters and 2FA.

6 years ago | Likes 1 Dislikes 0

And 2FA should always be active tbh if its a business / critical system, and thats often the case.

6 years ago | Likes 2 Dislikes 0

15 characters is not really a problem, I remember my 14 characters password easily. Not even a dictionary and has symbol/numbers.

6 years ago | Likes 1 Dislikes 0