|
The point to realize is that once it leaves your own infrastructure,
ANYTHING could happen to that email. In most cases, that will be
nothing... it will arrive on a destination server and then be kept nowhere
else. But the potential for it to be read or kept elsewhere is there; so
if it's a password to a crucial or valuable resource, it's probably a bad
idea to send a password in clear text. If for no other reason than as a
CYA measure!
There are alot of measures taken in IT security that are done for the sake
of auditor comfort or really, really long shot vulnerabilities. I see this
issue as the same sort of thing... the potential for exploitation or
trouble is pretty remote, but why open up the chance?
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.