Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type
Content from
{ "homeurl": "", "resultstype": "vertical", "resultsposition": "hover", "itemscount": 4, "imagewidth": 70, "imageheight": 70, "resultitemheight": "auto", "showauthor": 0, "showdate": 1, "showdescription": 1, "charcount": 3, "noresultstext": "No results!", "didyoumeantext": "Did you mean:", "defaultImage": "", "highlight": 0, "highlightwholewords": 1, "openToBlank": 1, "scrollToResults": 0, "resultareaclickable": 1, "autocomplete": { "enabled": 1, "googleOnly": 1, "lang": "en", "mobile": 1 }, "triggerontype": 1, "triggeronclick": 1, "triggeronreturn": 1, "triggerOnFacetChange": 1, "trigger": { "delay": 300, "autocomplete_delay": 310 }, "overridewpdefault": 0, "override_method": "post", "redirectonclick": 0, "redirectClickTo": "results_page", "redirect_on_enter": 0, "redirectEnterTo": "results_page", "redirect_url": "?s={phrase}", "settingsimagepos": "left", "settingsVisible": 0, "hresulthidedesc": "0", "prescontainerheight": "400px", "pshowsubtitle": "0", "pshowdesc": "1", "closeOnDocClick": 1, "iifNoImage": "description", "iiRows": 2, "iiGutter": 5, "iitemsWidth": 200, "iitemsHeight": 200, "iishowOverlay": 1, "iiblurOverlay": 1, "iihideContent": 1, "loaderLocation": "auto", "analytics": 0, "analyticsString": "", "show_more": { "url": "?s={phrase}", "action": "ajax" }, "mobile": { "trigger_on_type": 1, "trigger_on_click": 1, "hide_keyboard": 0 }, "compact": { "enabled": 1, "width": "300px", "closeOnMagnifier": 1, "closeOnDocument": 0, "position": "fixed", "overlay": 0 }, "animations": { "pc": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "fadeInDown" }, "mob": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "voidanim" } }, "autop": { "state": "disabled", "phrase": "", "count": 100 } }
Share This Post Now!

By Tim Barker

RISMEDIA, July 31, 2008-(MCT)-In the world of passwords, there’s a right way and a wrong way to protect yourself.

Cliff Gaines of University City, Mo., has lived on both sides of the line.

A decade ago, he was a poster child for how to do it wrong. His passwords were complicated enough. But he was committing a cardinal sin in the eyes of security evangelists: He was writing them down.

Those are five words that make most experts cringe. How, they ask, do you expect to keep yourself-or your employer-safe from identity theft and computer fraud if you leave the keys to your life scribbled on a piece of paper?

Turns out it wasn’t such a great system for Gaines, either.

“From time to time, I’d pull it out. But then I’d lose it,” Gaines said. “After that, you play tricks with your mind, wondering what you did with it. Was it on that business card I just gave out?”

Armed with a new system-based on the names of his favorite cars-Gaines long ago left the dubious ranks of those who put passwords on paper.

But if you’ve ever done it, don’t worry. You have company, probably the person sitting next to you in the office.

In a survey of 800 high-speed Internet users in the U.S. and the United Kingdom, slightly more than half of the U.S. respondents confessed to writing down their passwords. And nearly half of the survey group said they used the same password over and over again-another big no-no.

Elizabeth Niedringhaus, president of SSE Inc., a technology consulting firm based in Maryland Heights, has seen it all before.

“I can guarantee you if you walked into most small businesses and looked under the keyboards, about 30 percent of them would have their passwords written on little Post-it notes,” Niedringhaus said.

It’s merely a sign of the times we live in. Anyone spending time with a computer and the Internet is bound to have at least a dozen passwords to track. You have them for work, eBay, Paypal, online banking, favorite stores, message boards and social networking sites like Facebook or MySpace. Some must be changed every 60 or 90 days. Many have at least eight characters and contain numbers, symbols and capital letters.

Keeping them straight can be mind-boggling.

Just how critical it is depends on whom you ask. There is some debate about the value of passwords in the battle against the computer crimes that victimize 8 million people each year, costing more than $15 billion annually, according to the Federal Trade Commission.

Generally speaking, the risk of someone actually guessing the password to your online banking account is quite slim, particularly when you consider that most commercial sites limit users to a handful of guesses before the account locks up.

It is far more likely that identity theft will result from carelessness that has little to do with the strength of a password.

“By far, the greatest risk is that you will provide your password to someone,” said Fred Cate, a professor at the Indiana University School of Law.

It might be a friend or a family member you trust. Or it might be the person on the other end of an e-mail phishing scam-maybe the one masquerading as correspondence from your bank, urging you to log in to your online account to correct some issue.

Still, Cate says there’s no reason not to create strong passwords: “Why not be smart about it? It’s just like insurance. Most people who buy that never actually have to use it.”

But that doesn’t change the thinking of computer users like Chad Carter of Florissant, Mo., who commits half of each password to writing and the other half to his memory. Identity theft isn’t something he worries about.

“I’m sure it does happen randomly, but the odds of being targeted are pretty slim,” Carter said.

Some say that sort of thinking is what creates opportunities for identity thieves, who use a range of methods to get what they need from us.

The simplest are the brute force and dictionary attacks-computer programs that try over and over to guess your password. These attacks are the reason experts caution against using words found in the dictionary for your password and why employers make you change passwords every 90 days.

Another favored method is the use of Trojan horse programs to sneak into someone’s computer to look for passwords, credit card numbers and other data that could be used for identity theft.

“In the old days, you would have to go from trash can to trash can looking for information. Today you can write a program that does all the work for you,” said Todd Feinman, chief executive officer of Identity Finder, a New York City firm that specializes in safeguarding personal info.

© 2008, St. Louis Post-Dispatch.
Distributed by McClatchy-Tribune Information Services.