Classic Hackers: What War Games Taught us About Technology in the Workplace
Network Administrator
Much like the premise of the classic 1983 movie, War Games, and its computer whiz-kid lead character David Lightman, sometimes even the most complex passwords and security protocols within a business are compromised from one common, yet entirely preventable misstep: in-house protection.
Just as David Lightman snuck into the open and accessible area of the high school secretary’s desk to copy the password and change his grade, and developing a more complex breach leading him to the brink of global thermonuclear war, company employees are doing much the same. How? By posting passwords and logins on a sticky note on their computer, slipping pieces of paper with sensitive information under the keyboard, or “secretly” tucked away in the top right drawer of their desk.
Tsk. Tsk.
Many companies rightfully focus on the big picture when thinking technology and securing client data. But, beyond the best infrastructure, firewalls and encryption, lies easy-to-overlook lapses. What can you do? Whether you are a business owner or an employee, continue reading to find three great ideas you can do right now to secure your company and personal data at the workplace:
Keep in mind E-mail encryption is just one facet of encryption. There are several areas that encryption can be applied such as databases, hard drives, flash drives, applications, network traffic, etc.
Additionally, understand there are three different levels of encryption available and that all are not created equal:
Related read: Preventing Identity Theft Starts with Securing Your Personal Information
Unfortunately, not all companies are on board with encryption. Not because they don’t want to, but because many simply don’t understand what it means.
Many in business complain about security threats, but often, it is simply a matter of thinking in a different way. For example, even though faxing is considered archaic, it is still more secure than email because of the way it transmits the data (over a phone line).
So, if storing passwords in the brain through memorization is the most effective, how do hackers get into your brain? It’s not always some young kid in their bedroom trying to steal data. More likely it is someone trying to break into your home. They are looking for the simplest and easiest opportunity: windows that are left open, unlocked doors, mail or newspapers piling up, no lights on at obvious times of the day. Simply, when it comes to business, ensure the windows and doors to your work home are shut, locked and in proper working order.
Our management advisory team is ready to help you enhance your business security. If you have any questions, please don’t hesitate to contact me at mjaworske@zinnerco.com or any of our Zinner professionals at 216.831.0733.
We’re ready to have the conversation to help you avoid a thermonuclear war game from occurring in your place of business.