Page 113 - index
P. 113







• Encrypt all keys or passwords that are stored in repositories with an approval workflow to allow
access.

• Try wherever possible to avoid using the same password across multiple systems, and change
passwords on a regular basis, especially when staff moves!

• Whenever possible ensure that keys and passwords cannot be reused

Finally my advice to Mr. Snowden would be to watch another Tom Hanks movie called “Castaway” since
that may be his safest bet as far as a good location goes, and maybe Mr. Hollande may want to check
the origins of the word espionage! Always good to count the cost before you start something!

About The Author


Calum MacLeod has more than 30 years of experience in secure networking
technologies, and is currently responsible for European business development at
privileged identity management vendor Lieberman Software.



























Visit a Cyber Defense Magazine Sponsor, today:






















113 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   108   109   110   111   112   113   114   115   116   117   118