In the past, computer password protocols and protections left a lot to be desired. For example, computer users would often write down their password manually next to their workstation. If a manager asked them to change their password, they’d just swap out one digit or add one character. Despite information technology managers’ best efforts, these lax practices stymied attempts to ...
Read More »