Since the dawn of commerce, business owners have acknowledged that their greatest asset is their employees. Since the dawn of the internet, though, cyber-savvy business owners have acknowledged that they are also their greatest liability.
Studies on IT security have a common denominator when it comes to identifying the singlemost weak link in the cybersecurity chain: human beings.
It is a natural habit for individuals to want to take the easy path. Whilst that is often put forward as an undesirable attribute in a person, there are advantages too: if there isn’t an easy path, someone will invent one, and the result may be a step forward in technology.
There are times, though, when taking the easy path can have ruinous outcomes in the business world.
In IT systems, user convenience and tight security don’t always occupy the same space, and when employees take the easy path with passwords they put your business at risk.
The mistakes that employees make with passwords are not typically done with malicious intent, or any degree of wilful negligence; it’s often a simple case of ignorance. Most commonly, though, the motivation is one of convenience.
If the analogy of the easy path is applied to negligent password practices, it is perhaps not surprising that one can draw an interesting clue to its solution from M Scott Peck’s work, ‘The Road Less Travelled’, in which the noted psychiatrist describes the importance of discipline in achieving a state of well-being.
If discipline is the takeaway, business owners need to be proactive in engaging the cooperation of employees to stop risky password habits. A good place to start is with a written policy on what is, and what is not, acceptable.
Arguably, a company’s security is defined by its weakest password, so owners should raise the bar when it comes to rules for password length and complexity, offering tools to test password strength, and using a password manager with a single pass phrase rather than expecting employees to remember several of them.
The consequences of a breach can be devastating: loss of assets, loss of goodwill, loss of public integrity. A disciplined approach to password policies, protocols and practices is key to maintaining a secure network. Call it a path, call it a road, it’s the only way to go.