So, I got locked out of my Cisco “everything” account recently. At first I thought it was just my home router acting up, but after a couple days I called IT for help, and they asked me to reset my router, and my modem, and then when that was done they informed me that maybe my password had expired.
Long way of getting to the story. I hate when my password expires. We have pretty stringent rules about passwords here at Cisco. I appreciate that. I just don’t want to change my password. You see I have (guessing) at least 20 sites that I use, all have different password requirements. Some have unique requirements for User Names too.
So I have figured out that from now on, the day that I change my company password I am changing all of my other account passwords too. At least within Cisco they synchronize all of the passwords. But I still have all my individual accounts, and I’m quite sure they sit there and watch, here comes that idiot, requesting a new password. Why can’t these people remember their password, they likely wonder while they smirk.
To some degree it is a matter of how often you go to the website, I suppose. Read More »
Tags: automation, Borderless Networks, collaboration, cybersecurity, Factory, Industrial Automation, Industry, machine, machine builders, Manufacturing, mobility, operational excellence, password, R&D, Research and Development, security, Security Thought Leadership, shop flloor, strong passwords, supply chain
Hackers recently gained control of an Indonesian government Twitter account to falsely broadcast an impending, yet fictitious, tsunami in Jakarta, Indonesia to over 8,000 followers. While this was by no means considered a catastrophic event it certainly, I’m sure, caused a bit of chaos and disruption to the people in Jakarta and in the surrounding areas. Doesn’t this sound like the 21st century version of yelling “Fire” in a crowded movie theater? In any event, as is the case with any failures related to technology, there are some important lessons to be learned from this miscreant-generated Tweet…or shall we call it a “MisTweet”?
Read More »
Tags: password, security, social media, twitter
One of the phrases sometimes heard in certain circles I have traveled in was “Don’t be a victim,” or its near cousin “Don’t allow yourself to be victimized.” While these words of wisdom were passed around in some of the rough, hard biker hangouts up in the Santa Cruz mountains, they are relevant to the world of Borderless Networks as well.
In terms of mitigating risk, one of the very best things you can do is actually one of the simplest. When it comes to passwords, pick a good one and use it. Mix in numbers, special characters, uppercase and lowercase and avoid names and dictionary words and you are going to be in a far better place. Oh, and as 4chan illustrated when they hacked a Christian dating site, never assume that your password will not be stolen – you may want to use different passwords. For mobile devices, which are prone to being left in various places, it is critical to have a password protected locking home screen.
Read More »
Tags: Borderless Networks, password, pci