WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

626

at one of our remote locations, just grabbed a flat spot that had a free plug and a network port. Happened to look up at the pen caddy on the desk, there's the user's username and password on a post-it note with "Email login"

As I look around, every username and password for every system this person has access to is stuck on the desk. No wonder we can't keep a secure system.

at one of our remote locations, just grabbed a flat spot that had a free plug and a network port. Happened to look up at the pen caddy on the desk, there's the user's username and password on a post-it note with "Email login" As I look around, every username and password for every system this person has access to is stuck on the desk. No wonder we can't keep a secure system.

(post is archived)

[–] 2 pts

How so?

[–] 3 pts

If you can gain access to the second factor or bypass it through social engineering it's worse to have it than to not have it. Why? Because it requires extra time every day for something that doesn't work as intended. Kinda like all that airport security after 9-11