What is your mother’s maiden name?
Where were you born?
What high school did you graduate from? All of these and many others have answers that are probably public information. ESET, Chillisoft." > What is your mother’s maiden name?
Where were you born?
What high school did you graduate from? All of these and many others have answers that are probably public information." /> What is your mother’s maiden name?
Where were you born?
What high school did you graduate from? All of these and many others have answers that are probably public information." >
Story image

Honesty is not The Best Policy for Password Resets

05 May 2009

Common password reset questions include the following:

What is your mother’s maiden name?
Where were you born?
What high school did you graduate from?

All of these and many others have answers that are probably public information. In other words, it isn’t hard to know the answer to your “secret question”. Let dishonesty be your secret weapon!!!

There is no reason you can’t make up the answers, the only trick is to remember your lies. OK, let me put this in a more socially acceptable manner. Make up a new life. Make up a story and
remember it.

So, now your mother’s maiden name becomes “Smurf” or something equally silly. You graduated from “Basketcase HS”. I was born in “A Different Galaxy”.

Make up a story, it will help you to remember it. Pick a character in a book if you wish. As long as the information isn’t easily guessable then it will be very hard for an attacker to change your password by answering a ridiculously easy question.

If you choose your own questions then make sure the answer isn’t easy to guess or find on the web.

Randy Abrams
Director of Technical Education

ESET Global

To find out more about ESET, visit the ESET website.

Enterprise WLAN market heading toward global slowdown
Revenue contribution from licenses exceeds contribution from access points for Enterprise Cloud in next five years.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
Red Hat expands integration product capabilities
Adds end-to-end API lifecycle support and new capabilities for agile integration across hybrid architectures.
BMC adds IBM Cloud, Watson to Helix solution
BMC Helix with IBM Watson delivers cognitive insights across structured and unstructured federated knowledgebases.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
NZ Cricket ups data analytics game with Qrious
The Black Caps and White Ferns have implemented a data and analytics solution from Qrious to monitor and improve game strategy and player performance.
Gartner: Smartphone biometrics coming to the workplace
Gartner predicts increased adoption of mobile-centric biometric authentication and SaaS-delivered IAM.
IDC: A/NZ second highest APAC IoT spenders per capita
New IDC forecast expects the Internet of Things spending in Asia/Pacific excluding Japan to reach US$381.8 Billion by 2022.