Through personal experience working primarily with “internal support (only assisting users working within the company employed with), many times, the task of password recovery has come up, both for current employees simply trying to regain access to accounts, or for access into the accounts of terminated employees with the specific intent of ensuring no sensitive material had been shared prior to the termination. In both cases, personal knowledge of each individual was most commonly exploited for assisting in the password recoveries, especially since (even though strictly forbidden by company security policies of every organization), passwords were commonly shared with other employees specifically with the iniquitous intent of “keeping the business running” when others forgot their passwords and did not have time to work with the helpdesk for their own recovery prior to needing to complete various tasks. Even within the field of giving temporary passwords to employees for them to change immediately, it is common practice to utilize a simple password that they can change at their convenience, and when polled, each technician will explain the reason that certain word and letter combinations are given, having themselves been created as a keepsake style that …show more content…
#1). Harari writes a compelling article that theorizes that through humanities existence, there has been a shift from the worship of deities, to strongly willed charismatic individuals, and finally into the “…all-encompassing data-processing system […] (Harari par. #3) and the manner people “merge” into this data stream in effect losing their own free will over the stronger desire to belong to the largest encompassing “body” and as such having “free will” replaced by the nearly mindless following of this new