Academic journal article ABA Banking Journal

The Myth of Technical Security

Academic journal article ABA Banking Journal

The Myth of Technical Security

Article excerpt

Here's a sincere wager. I'LL bet a dollar against $10 that when your organization terminates an employee it takes at least 48 hours, if not significantly longer, to remove all their access codes and permissions from all your systems.

A bit dramatic perhaps, but it makes the point. The real flaws in our security systems are not the technical gaps, but the business processes and levels of education and awareness which support and surround our use of the flashing boxes. Security is, for the most part, one of those annoying management issues for which there is no technological silver bullet.

The answer is certainly not to do away with computer security protocols, but to spend an equally significant amount of resources on the human element involved in keeping our information secure from prying eyes and greedy fingers. How often do your employees change their passwords, and do they have any understanding as to what makes a good versus a bad choice of passwords?

The recent incident involving Absa Group, Ltd., the South African banking company, is a good example of human behavior thwarting security measures. A handful of customers inadvertently loaded key-stroke copying programs onto their computers when they ran programs down-loaded from the internet. These programs captured all the keystrokes entered into the computer and transmitted it to hackers, who then had full access to the client accounts. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.