Yahoo uses a common password-recovery mechanism for those who forgot their passwords: a series of personal questions to determine the user's identity. In the Sarah Palin case, the three questions were:
- What is your ZIP code?
- What is your birthday?
- Where did you meet your spouse?
Unfortunately for Palin, as a public figure, this information is readily available. Her birthdate is in the first line of her Wikipedia entry. That same entry reveals that she currently lives in Wasilla, Alaska. A quick search of the United States Postal Service website reveals that there is only one ZIP code for street addresses in Wasilla.
The third question is a little trickier and required some guesswork. Her Wikipedia entry notes that her husband Todd is her "childhood sweetheart." It also adds that she attended Wasilla High School. Combine those two facts with a little inference, and you get the answer to the final question: she met her spouse at Wasilla High School.
So what does this mean for the enterprise? If you're running any type of service that allows end-users to retrieve forgotten passwords, now is a good time to look at the security of that service. Are you asking easily guessed (or researched) personal questions? If so, rethink your approach. At the very least, choose stronger, more obscure questions, such as "What was your favorite sandwich as a child?" or "Where did you purchase/adopt your first pet?" Alternatively, if you're willing to make an investment in this area, you might consider using a third-party identity-verification service that asks the user questions based upon pulling his or her credit report.
Dig deeper on Password Management and Policy
Related Q&A from Mike Chapple, Enterprise Compliance
The HHS security risk assessment tool is designed to help healthcare providers meet the HIPAA security requirement. Expert Mike Chapple explains how ...continue reading
PCI DSS requirement 6.6 demands application security compliance through one of two options: an application firewall or a code review. Expert Mike ...continue reading
Are HIPAA-compliant hosting services a better option for compliance than a secure storage API? Expert Mike Chapple analyzes.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.