• lud@lemm.ee
    link
    fedilink
    arrow-up
    6
    ·
    6 months ago

    If you are internal IT you (or someone at least) should disable fastboot though GPOs

    • lennivelkant@discuss.tchncs.de
      link
      fedilink
      arrow-up
      5
      ·
      6 months ago

      Idk how that person’s IT works, but in mine, that would probably warrant a lot of paperwork. The techs would have to pitch the change to client management, client management would have to pitch it to change management and provide test results to show it has no side effects, then deal with the techs complaining about the uptick in tickets about slow boot times or people justifying never shutting down or restarting with it taking so long to boot.

      Not that they’re actually slow, our users are just super entitled. I got to observe the rollout of automatic screen lock for security reasons, and the ensuing pushback. The audacity of having to reenter your password if you’ve spent more than ten minutes doing nothing!

      Security even managed to push for reducing it to five minutes after some unfortunate incident… but it got reverted for reasons you can probably guess. Hint: shit always flows downward.

      • lud@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        6 months ago

        I recommend looking into Windows hello for business to reduce the usage of passwords in the first place. It’s so much nicer to use your fingerprint, face, or even a PIN.

        • rekorse@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          5 months ago

          I would never consider fingerprints or face scans to be secure even for personal devices. I guess if theres literally nothing to protect, if thats possible.

          • lud@lemm.ee
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            5 months ago

            Passwords can in most scenarios be considered to be even less secure.

            Remember that you aren’t replacing 64 character passwords with fingerprints. You are replacing 8 character shit passwords with fingerprints.

            Also pretty much everyone in IT security agrees that passwordless is the way to go.

            Passwords REALLY fucking sucks for so many reasons.

            • rekorse@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              5 months ago

              I do understand the point that the biometrics are replacing very short pins usually, oftentimes 4 digits only but I dont quite see how that makes the passcodes worse than the biometrics.

              I’d say even a 6 digit passcode with a randomized number pad, alongside an emergency wipe pin, would do better than biometrics, which also need to have a passcode setup as backup anyhow.

              Maybe you could play out a few scenarios that illustrate your point?

              • lud@lemm.ee
                link
                fedilink
                arrow-up
                1
                ·
                5 months ago

                Why exactly do you think biometrics are so terrible? Is it because you could theoretically access someone’s computer when they are sleeping or something?

                As far as I’m aware that is not the consensus in the industry. I even need biometric (in combination with a card and a pin) to enter a specific datacenter.

                I do think that bringing up specialised and uncommon hardware like randomised number pads is out of scope. Are you talking about highly sensitive and restricted systems? I’m talking about normal user computers.

                • rekorse@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  5 months ago

                  Randomized keypads are for touchscreens, although like you said sort of not common for desktop workstations.

                  Just comparing a password to biometrics though on say a laptop or desktop, there is the major drawnback that you can be forced either knowingly or unknowingly to put in a biometric to unlock a device. It would be easier to circumvent then a standard password (at my company and the clients we work with, 16 characters is standard) with an encrypted hard drive.

                  This is all deduction ive made from other things I know to be true though, if you happen to know of a resource that explains both methods of securing g a workstation and the risks associated, I’d love to read it.

                  I also do agree overall that password less makes the most sense now, as people are never going to get better at making secure passwords and remembering them.

                  • lud@lemm.ee
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    5 months ago

                    We use 16 characters as well, but a huge problem with pretty much any method is that a wrench can defeat them all.