April 19, 2014
 
 
RSSRSS feed

Why Do Security Pros Forget About Users? - page 2

A Security Lesson in a Washbasin

  • November 14, 2008
  • By Kenneth van Wyk

I've had two recent experiences that made me sit up and take notice of how the designers clearly �got� the use case and made a secure and user-friendly experience. The first was with my Apple iPod Touch, and the second was with my Apple Airport Extreme.

When I configured my Touch, it automatically looked at my email server settings and replicated them on the Touch. Not a huge accomplishment, you say?

Well, I use IMAP and SMTP, like many of us do, but on my server, I only allow SSL encrypted IMAP and SMTP traffic, and the SMTP service only accepts authenticated connections. With most email clients, if they support this configuration at all, it takes some custom configuring via an �advanced� button or some such.

But, much to my shock and awe, the Touch grabbed these configuration oddities and set things up exactly as I wanted them, without having to do a thing as the user. Voila � my Touch email client was configured as securely as the email client on my Mac is.

First try. Amazing.

Next came the Airport Extreme. I was replacing an older Wi-Fi router that was clearly on its last legs. (It kept dropping connections and losing some of its configuration settings randomly, but was kind of sort of functional otherwise. Clearly on its death bed.) In the configuration wizard for the Airport, I was asked if I was replacing an existing router with the new one. I'd never seen that question before, and I went ahead and selected �yes.�

Article courtesy of Datamation

Sitemap | Contact Us