What to do when the best path is broken?

29WednesdayMAY 2013

Kind of stumped after perusing the BoingBoing lead to the article “Anatomy of a Password Crack” – I knew sometimes it was trivial, but alas, if our best practice is just a minor annoyance to those who desire our information, then what?
Guess it goes hand in hand with the two-factor efforts, but I do think this is really just a point in time when we will look back and say “oh, we should have made a left at that fork, not a right…”