An article on effective ways to improve security.

My first job out of college was as a software engineer for a Military contractor. Those were the days of minicomputers and terminals.

If you wandered off and left a terminal logged in, you would return to some very grateful co-workers. While you were away, an enterprising individual had used your terminal to send an e-mail to the entire department promising that you were buying the drinks on Friday at lunchtime.

Thankfully, I never had to learn this expensive lesson, but twenty years later, it is a great way of enforcing security from within.

Post a comment or leave a trackback: Trackback URL.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: