Category Archives: 3.1 Information Tehnology

Appropriate access rights

When it comes to means of data protection, most people can only think of passwords. Yes, they prevent any third party access obviously and are essentially as important as any other security measure, one thing often overlooked however are the access rights.

We say ‘access rights’ in terms of what data and actions the user is allowed to view and perform in the system. You don’t want everyone to be able to do everything now, do you?
Continue reading

When is a password good?

There is a saying that you simply cannot repeat some things enough. One of those areas is security. Whilst physical security in terms of alarms, locked doors etc is as important, with this post we are focusing on data protection and namely passwords.

It has come across in our practice, that there are programs with no password at all or it is simply this week that it is essentially useless. When asked ‘why even bother with the password then if it is the same for everyone and (to make things worse) is only comprising of two characters?’ you usually don’t get a reasonable answer.

Since most accounting software programs and similar or supporting applications let you customize the password settings, it is best to make use of this.
Continue reading