Comments on Lessons learned in 2010′s network security failsWhat's new and what matters in IT news, opinion and analysis.2013-05-08T17:37:49Zhttp://itknowledgeexchange.techtarget.com/IT-watch-blog/lessons-learned-in-2010s-network-security-fails/feed/atom/By: JinteikJinteikhttp://itknowledgeexchange.techtarget.com/IT-watch-blog/?p=2458#comment-2832010-12-30T17:08:32Z2010-12-30T17:08:32Zit is extremely important to have strong passwords and even settings when passwords has been tried 3 times, the ID will be disabled and will not be able to login after x amount of time and etc…
I will add on that when newbies get their id lockout, they will then share id’s with others. or when they are on leave, they will pass their ID’s around…this is something that should not be done at all too.
]]>By: MelanieYarbroughMelanieYarbroughhttp://itknowledgeexchange.techtarget.com/IT-watch-blog/?p=2458#comment-2802010-12-29T19:42:34Z2010-12-29T19:42:34ZGreat point about the monetary commitment that sufficient security requires, Valmsmith. What are your thoughts on the overwhelming predictions that 2011 is going to be a year of increased security spending in the wake of WikiLeaks and the Google/China debacle?
]]>By: ValmsmithValmsmithhttp://itknowledgeexchange.techtarget.com/IT-watch-blog/?p=2458#comment-2722010-12-24T01:38:58Z2010-12-24T01:38:58ZHow many times do we tell the newbies we are training to make STRONG passwords and be prepared to change them at least once in a while, and to NOT use the same one repeatedly particularly on “critical” sites. I am personally concerned about some servers who will not allow us to use “special characters” in our passwords. That is one of the better ways to keep the miscreants out. There are MANY excellent ways to secure our sites, but with a few exceptions they are NOT inexpensive upfront.