Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Considering LastPass’ Breach, Should Password Managers Be Trusted?

Considering LastPass’ Breach, Should Password Managers Be Trusted?

It’s been about a month since LastPass—one of the most well-known and popular password managers out there—suffered a security breach where attackers managed to worm their way into the systems where LastPass stored its source code. Let’s review the situation, and what your response should be.

First, let’s go over what we know.

LastPass Lost Their Intellectual Property, Not Customer or Employee Data

According to the password manager’s report, no customer or employee data was successfully accessed, with those responsible instead only gaining access to the password manager’s proprietary source code. We say “only” because many pieces of proprietary software these days use many, many open source components, all of which need to be documented even if some modifications were made.

So, while LastPass’ source code could be helpful to a prospective attacker, it isn’t going to be their magic bullet to get in.

This is also why open-source projects—where source code is openly shared so it can be examined and improved upon—are able to exist. Many of these open source projects have received security updates for vulnerabilities that went unnoticed, despite all eyes having access to the code.

Furthermore, a Decent Password Manager is Effectively Useless to Break Into

To explain this, let’s pretend that your password manager is like a giant bank. You go to the bank and deposit your money—your passwords and other credentials—into their vault for safekeeping.

The fear is that, should someone manage to break into the bank and access the vault, all of your money is there for the taking. This would be the case if your password manager was just storing the passwords you provided on their own servers. However, that isn’t how a reputable password manager functions.

To return to our bank analogy, the vault is really only filled with safety deposit boxes that are brought to you when you need to access them. You have your master key (the password to the vault) along with another, secondary form of identity authentication to provide that is generated on the spot, and required to access your safety deposit box.

Notice that the bank doesn’t have the key to your vault, meaning that they actually can’t allow someone else to access your safety deposit box, whether that someone is a criminal or a member of law enforcement.

This is how a password manager works: rather than storing your passwords, encrypted versions of your passwords are stored—and, with you being the only one with the password to your other passwords, the password manager can’t decrypt them on its own.

So Yes, It is Still a Good Idea to Use a Password Manager…

…and for a few reasons, too.

  • A decent password manager helps reinforce password best practices, in that it condenses the tens and dozens of passwords you should be remembering into a single password that is supported by multi-factor authentication. It’s no secret that many people shrug off the best practice of using a unique password for each account. Because the password manager stores them for you, you only need to remember the one password that gives you access to your password storage.

  • A decent password manager can help you come up with better passwords, preventing you from using recognizable patterns. I want you to do me a favor and think of a completely random password. Now, consider that password and see if you included any personal details or other information that could be associated with you. Did you stick to a pattern that you’ve used in your other passwords? A password manager can help you avoid these habits by generating longer, more complex passwords on your behalf.

  • A decent password manager will stop you from recycling passwords. Let’s say that a website you have an account on is hacked, and your login credentials are exposed in the data breach. If you’ve used the same login credentials elsewhere, that’s another however-many accounts that have been compromised. A password manager removes the temptation to use the same password everywhere, because it makes it easier for you to switch them up.

  • A decent password manager will help protect you from phishing sites. You and your password manager see websites differently, so while you may see Facebook or a Gmail login page, your password manager won’t, and will prompt you to not put in your credentials.

Make No Mistake, the LastPass Hack Isn’t Good News…

…but it also isn’t nearly as bad as it could have been. Voyage Technology is here to help you make sure that your security is as established as possible, protecting you from issues, threats, and attacks—including through the use of a reliable password manager. Give us a call at 800.618.9844 to find out what we offer to businesses.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Email Phishing Workplace Tips Computer Google Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Small Business Microsoft Workplace Strategy Data Backup Communication VoIP Saving Money Smartphone Business Management Android Smartphones communications Mobile Devices Data Recovery Backup Passwords Managed Service Managed IT Services Upgrade Browser Social Media Microsoft Office Disaster Recovery Network Tech Term Internet of Things Remote Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Remote Work Managed Service Provider Miscellaneous Gadgets Windows Server Current Events Information Outsourced IT Employee/Employer Relationship Encryption Spam Productivity Holiday Windows 10 Data Management Government Compliance Office AI Business Continuity Windows 10 Wi-Fi Virtualization Training Business Technology Blockchain Data Security Two-factor Authentication Apps Bandwidth Mobile Office Apple Networking Mobile Device Management App Gmail Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Budget Vendor Applications How To BDR WiFi BYOD Conferencing Computing Information Technology Access Control Office 365 Tip of the week Hacker Avoiding Downtime Managed IT Services Help Desk Operating System Big Data Risk Management Healthcare Virtual Private Network Health Analytics Office Tips Computers Augmented Reality Retail Storage HIPAA Password Router Website Bring Your Own Device Marketing Firewall Windows 11 Monitoring 2FA Going Green Patch Management Save Money Remote Monitoring End of Support Excel Vulnerability The Internet of Things Vendor Management Cybercrime Remote Workers Social Telephone Display Printer Paperless Office Infrastructure Cooperation Free Resource Project Management Customer Service Windows 7 IT Support Document Management Microsoft 365 Solutions Scam Data loss Word User Tip Administration Modem Mobile Security Processor Holidays Data Storage Robot Smart Technology Supply Chain Safety Video Conferencing Settings Managed Services Provider Wireless Printing Saving Time Virtual Machines Content Filtering Professional Services IT Management YouTube Meetings VPN Managed IT Service Cryptocurrency Downloads Computer Repair iPhone Licensing Virtual Desktop Customer Relationship Management Data storage Entertainment LiFi Vulnerabilities Data Privacy Outlook Images 101 Machine Learning Hacking Money Telephone System Multi-Factor Authentication Mobility Presentation Humor Cost Management Wireless Technology Maintenance Sports Antivirus Mouse Employees Integration Username Managing Costs Amazon Hard Drives Mobile Computing Tablet eCommerce Search Black Friday SSID Domains Virtual Assistant Outsource IT Best Practice Database Surveillance Alert Buisness File Sharing IT Technicians Virtual Machine Environment Dark Data Media Refrigeration Managed IT Public Speaking Legal Proxy Server Reviews IT solutions Cookies How To Cyber Monday Medical IT Hotspot Transportation Small Businesses Lithium-ion battery Business Growth Tactics Development Notifications Entrepreneur Travel Mirgation Hypervisor Displays Techology Shopping Google Maps Nanotechnology Optimization Cortana PowerPoint Language Employer/Employee Relationships Outsourcing Alt Codes Addiction Management PCI DSS Downtime Unified Threat Management Chatbots Navigation Undo Unified Threat Management Gig Economy Hosted Solution Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Typing Service Level Agreement Internet Service Provider Regulations Compliance Identity Network Congestion Evernote Paperless Google Drive User Error Bookmark Smart Tech Memes Knowledge Physical Security Co-managed IT Alerts SQL Server Technology Care Application Download Net Neutrality Financial Data Point of Sale History 5G Business Communications IBM Google Docs Browsers Smartwatch Unified Communications Connectivity IT Experience Break Fix Scams Azure Hybrid Work Bitcoin Network Management Upload Procurement Running Cable Tech Support Google Wallet Social Network Telework Cyber security Monitors Multi-Factor Security Tech Human Resources CES IoT Communitications Dark Web Cables Laptop Websites Windows 8 Trends Supply Chain Management Drones Customer Resource management FinTech Regulations Google Calendar Term Google Apps Competition SharePoint Data Analysis Star Wars IT Assessment Electronic Medical Records Microsoft Excel IT Maintenance Halloween Staff Value Business Intelligence Gamification Flexibility Lenovo Organization Social Networking Writing Legislation Shortcuts User Fileless Malware Digital Security Cameras Smart Devices Virtual Reality Ransmoware Scary Stories Private Cloud Wearable Technology Memory Vendors Hacks Server Management Content Remote Working Superfish Health IT Identity Theft Motherboard Data Breach Fun Comparison Google Play Be Proactive IP Address Directions Videos Deep Learning Assessment Electronic Health Records Twitter Permissions Workforce Error Wasting Time Threats Education Trend Micro Social Engineering Specifications Security Cameras Workplace Strategies Fraud Meta Recovery Microchip Internet Exlporer Software as a Service Remote Computing

Blog Archive