LG Networks, Inc.

Do you know your essential passwords?

BusinessContinuity_Nov27_B

Superstorm Sandy, the recent storm that pummeled the Eastern US, brought with it a lot of lessons for all affected.

For those in the IT industry the most important lesson was that their disaster preparedness may not be as robust as they thought. Many businesses will react to this by wanting to be better prepared for major disasters. This is positive action but it is important to stress that there are also a million little issues that could pose a bigger threat to your organization. One of those is password management – who is in control of the important passwords.

Search for Terry Childs online and you’ll find a number of articles about a former Network Administrator for the city of San Francisco who is currently in jail for supposedly doing his job. His job, as a network administrator, was to manage the city’s network. When he was asked by his boss for the passwords to critical parts of the network, he refused on the grounds that the request went against the established network policy.

Issues like this: One employee or vendor in control of vital passwords, can pose a big problem to companies, especially during times of disaster. Imagine if you work with an administrator who is based in New York, and they lost power during Sandy. What could you do if your network crashed, or you needed access to your system and someone else has all the passwords?

The most crucial factor is you shouldn’t trust one person or organization with passwords to vital systems. We don’t mean personal passwords to systems, we mean passwords to vital systems, like servers or Internet connections. If one person has the passwords, there’s just too much risk. If they are disgruntled, they have the power to do some serious damage, and if they are injured or are no longer alive, you’ll face untold amounts in lost profit, and fees in recovering passwords and information.

There are a number of things you can do to mitigate problems like these.

If you are in the unfortunate position of not having the passwords to your system, it’s a good idea to get in touch with IT professionals like us, as we are often able to recover systems and passwords, or at the very least, reset them. After you recover your systems, it’s a good idea to test for vulnerabilities, especially if the last person in charge had a tendency to not share information. We can help with this and any other concerns with password management and recovery, so please contact us if you would like to learn more.

Published with permission from TechAdvisory.org.
Exit mobile version