Monthly Archives: August 2014

Yellow Sticky of Doom Revisited

Talking with security experts about the Yellow Sticky of Doom shows that the situation isn’t entirely bleak. They agree that posting notes on a monitor – or the bottom of a keyboard – is bad. However, they recognize that (somewhat … Continue reading

Posted in Security | Leave a comment

Greatest Threat: Yellow Sticky of Doom

We now get to what I consider the greatest threat to computer security: the Yellow Sticky of Doom! Passwords written down on yellow sticky notes. These are everywhere. What is the difference between a secure facility and an insecure facility? … Continue reading

Posted in Security | 5 Comments

Threat: Joe the Backhoe Operator

Where Dennis the Weatherman is a proxy for all the threats nature can pose, Joe the Backhoe Operator is a proxy for man-made threats outside the data center. Backhoe Fade is a familiar term in the telecommunications industry, where it … Continue reading

Posted in Security | Leave a comment

Threat: Dennis the Weatherman

Dennis the Weatherman is a proxy for the threats that nature presents. Superstorm Sandy is a recent example of the power of weather. Some places received over a half meter of rain in less than 24 hours, as well as … Continue reading

Posted in Security | Leave a comment

Threat: Dave the Service Technician

Dave is responsible for adding, upgrading and repairing systems. Without Dave, things will quickly go downhill in your data center. While Dave is responsible for maintaining system integrity, he can also compromise it: A drive has failed in a RAID5 … Continue reading

Posted in Security | Leave a comment

Threat: Sally the User

Unlike Sam the Disgruntled Employee from our last post, Sally doesn’t have an evil bone in her body. She is dedicated, hardworking, helpful, and committed to doing a good job. Unfortunately, she doesn’t completely understand how the system works, and … Continue reading

Posted in Security | Leave a comment