![]() Although any password can eventually be cracked, there are degrees of magnitude in the time it takes to crack a six- character password and a 20-character password. The single most effective defense against a password cracker is to simply use a strong password. Marcus Carey, in Dissecting the Hack, 2010 Strong and Unique Passwords This can be use to authenticate at a device or container level. Some of these options can include fingerprint authentication through Apple’s Touch ID or Samsung's fingerprint scanner. It’s important to balance that with the user-experience to avoid lack of mobile adoption or causing users to circumvent security controls in other ways, commonly referred to as Shadow IT. And in those cases, some have incorporated a 6-character PIN or passcode at an App-level or Container-level.īottomline: it comes down to the organization, but it’s very important to consider the broader mobile security controls not found in the typical PC world (eg, Wipe after 10 bad passcode entries). Many security conscious organizations have embraced App-level or Container-level passcodes to protect corporate data. Most EMM policies can then enforce various complexities or wipe a device after 10 bad PIN entries. Users are accustomed to a 4-character PIN. Requiring a user to enter an 8-character complex password to unlock their mobile device makes for a horrible user-experience. This is a prime example of traditional policies that just don’t work well in the mobile world. It typically stems from traditional PC and Server 8- character password policies that require various complexities to achieve compliance or traditional security best practices. ![]() Raggo, in Mobile Data Loss, 2016 PINs, Passwords, and Passcodesĭetermining passcode enforcement policy can be challenging for some organizations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |