Solved

Security Concern: Usernames in Email Addressed

Posted on 2007-03-28
2
243 Views
Last Modified: 2011-09-20
Our organization currently assigns email accounts for our staff using their username…

Example: If the username is smith123, then their email address is smith123@ourcompany.com

When we consider security, we now realize this isn’t the preferred method of assigning email accounts. Now the decision/question is do we…

A) Reassign email accounts, change all the business cards, contact everyone that has our emails addresses on record and hope they update their records… OR

B) Change the usernames, make changes in all the programs the reference these usernames in hardcode, watch for any anomalies and hope nothing is failing ‘under the hood.’

Another option/question is how vulnerable are we to leave things the way they are? If passwords consist of eight complex characters (a-z,A-Z,0-9, !-$), would bumping this up to 10 charters be the ‘easy’ solution?
0
Comment
Question by:todjklki
2 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 63 total points
Comment Utility
I would simply start with additional official email addresses.

like firstname_surname@company.com (or j.sixpack@company.com)

The now active email addresses could be kept, just when it's time to make new business cards use the new email address. Also change the signatures in your emails to match the new email-addresses.

After a year or two the "old" email addresses will be forgotten by your business partners, within company you can use them as long as you wish.

Tolomir
0
 
LVL 32

Assisted Solution

by:r-k
r-k earned 62 total points
Comment Utility
Good advice from Tolomir. I just want to add that IMO a 10-char password is always much much better than an 8-char password. In fact length of the password is much more important than the complexity, so long as single dictionary words and common names are avoided.

Whether you should change the email addresses right-away or use Tolomir's suggestion depends on your particular security requirement. In a highly secure environment, probably yes, but other steps such as firewall, lock-outs, password length etc. are surely more important than hiding usernames.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now