Understanding the "45 Degrees" Cybersecurity Principle

When it comes to cybersecurity, there are a lot of terms and principles that might seem a bit daunting, especially if you’re not an IT expert. But don't worry! We're here to break down one important concept that’s crucial for small businesses: the "45 Degrees" cybersecurity principle.

Picture this: you're sitting at your desk, and you need to remember your complex password. What do you do?

If you're like many people, you might write it down and place it somewhere easy to find—like a sticky note on your desk or in a drawer to the side of your monitor. This habit is what the "45 Degrees" principle addresses.

The "45 Degrees" principle refers to the tendency of people to store passwords and security information within a 45-degree angle to the right or left of their computer monitors.

This could be on a sticky note, in a desk drawer, or even in the names of loved ones displayed in photos near your workspace. While this might make it easy for you to remember your passwords, it also makes it incredibly easy for hackers to find them.

This makes hacking humans pretty easy because they’re lazy.

If I were to sit down at a desk, based on the 45-Degree Principle, odds are, the password I need to access their computer system exists to the left or right of me, in plain sight, or, in the desk I’m at.

Hackers know this common habit and will look for clues within this 45-degree zone. It’s a bit of social engineering. They might look at names on pictures, sticky notes, or even the brand name of your monitor as potential passwords. This method of keeping passwords puts your security at significant risk because it relies on easily accessible and guessable information.

So, how can you protect your business without falling into this trap? Here are some practical tips:

  1. Use a Password Manager: Store your passwords securely in a password manager instead of on paper. This way, you only need to remember one master password.

  2. Avoid Common Names: Don’t use names of children, spouses, or pets as passwords. These are easily guessable and often found within the 45-degree zone.

  3. Secure Storage: If you must write down passwords, store them in a locked, secure place, away from your desk and computer.

  4. Employee Training: Educate your employees about the risks of poor password management and encourage the use of secure methods.

According to a report by Verizon, 43% of cyber attacks target small businesses. By avoiding the pitfalls highlighted by the "45 Degrees" principle, you can significantly reduce your risk of a security breach.

Remember, good cybersecurity practices don't have to be complicated. By being mindful of where and how you store your passwords, you can keep your business safe and secure.

R

Russell Mickler

Russell Mickler is a computer consultant in Vancouver, WA, who helps small businesses use technology better.

https://www.micklerandassociates.com/about
Previous
Previous

CIO vs. CTO vs. CPO vs. CISO: Decoding the C-Level IT Roles for Your Small Business

Next
Next

The Benefits of Using the IRS' WISP for IT Governance: A Guide for Tax Preparers and Accountants