An article on effective ways to improve security.

My first job out of college was as a software engineer for a Military contractor. Those were the days of minicomputers and terminals.

If you wandered off and left a terminal logged in, you would return to some very grateful co-workers. While you were away, an enterprising individual had used your terminal to send an e-mail to the entire department promising that you were buying the drinks on Friday at lunchtime.

Thankfully, I never had to learn this expensive lesson, but twenty years later, it is a great way of enforcing security from within.

Post a comment or leave a trackback: Trackback URL.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: