It’s amazing how after decades of the internet being around, there is still no one grand way to keep information safe. People are the single greatest threat to information security. Because of this, no one can ever guarantee with 100% certainty that information is safe. I bring up past decades because after reading The Cuckoo’s Egg by Clifford Stoll, a book based on hacking in the late 80’s and early 90’s, I saw that even back then, it was people that allowed information leaks. When you think of a stereo typical hacker, you might envision the cast from Sneakers, Hugh Jackman, or a much younger, more innocent Angelina Jolie. You might think of the people who seem to flawlessly navigate their way past firewalls, systems networks, and encryption. Based on the true account of Cliff Stoll—a Systems Manager from Berkley in 1989—and even up to news on current events, this was rarely the case. I’ve heard it called the “sticky note” problem. People use, or are assigned, strange passwords and usernames and in order to remember them, they put a sticky note next to the computer. In the case of Cliff Stoll, he witnessed people in his system saving their passwords in their files or sending them in emails. In other words, the key to a secure place was being stored in a relatively public place. Finding these keys is by far the easiest and most common way for hackers to access protected.
We are all caught in the balance between security and convenience. I hate, for example, that Chase makes me type in my password every time I want to check my account balance on my phone. However, that keeps my information safe from anyone stealing my phone and transferring money to their account. Human nature has changed a whole lot slower than technology has since 1989. We can use all the firewalls and extra security measures we want, but ultimately, it will be human error that will likely overthrow efforts to protect data. Using common passwords, storing passwords, sharing passwords, or using the same password for banking as you do for your shared wireless, are just some of the examples of through thoughtlessness, malicious people gain access to places they shouldn’t. Before you invest in new software or systems to protect data, make sure that you and whoever you want to have access are as careful about behavior and practices as they are with their homes; i.e., don’t lock the door and leave the keys on the porch.