Monthly Archive: December 2015

If Callam did the budget

Rarely is a letter from the tax man good news. Usually it involves them telling you how you owe them money. It turns out the government is using HMRC to distribute letters showing how your taxes are spent. If we convert the absolute numbers to percentages then we can see how the budget is divided up. Bloody hell, I don’t know what this is, but it certainly doesn’t look like economic conservatism. Let’s take a look, section by section, and see if we can’t identify some waste. Welfare 25.3%: Over a quarter of our taxes goes to the welfare state….
Read more

Share

Time for a new approach to password security?

The password. It’s been used for thousands of years and today¬†represents the key security token in modern computer systems. Despite its ubiquity, the password is not well loved. Attitudes towards passwords vary from apathy to downright contempt. Very few people would ever stand up and argue that the password is a good method of securing a system. IBM predicted back in 2011 that the password would be dead within five years. However, while the giants of the technology industry are rushing to consign passwords to the dustbin of history, nobody seems to be asking whether the problem is with passwords…
Read more

Share

Physical Security: How to cause mayhem!

I have a number of rules I use in a professional and sometimes personal capacity. This is number 1: Always assume the worst about everything. You’ll rarely be disappointed. When you apply it in a security context, it means given a choice, users will always choose the stupid option. Take passwords, if you don’t mandate a certain password quality, then they’ll choose crap passwords (No, Pa55w0rd does not could as a good one!) If you make the password rules too difficult, well… With a little patience and technical expertise though, it is possible to secure your systems effectively. Password policies,…
Read more

Share