End user auditing consists of ensuring security policies — such as password requirements — and due care is provided to sensitive documents.
Clients regularly ask IBM’s X-Force Incident Response team to scan their networks for intrusions, malicious activities or other risk factors. One such risk factor that we look for is the use of weak passwords. As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.
Leave a reply