Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Considering LastPass’ Breach, Should Password Managers Be Trusted?

Considering LastPass’ Breach, Should Password Managers Be Trusted?

It’s been about a month since LastPass—one of the most well-known and popular password managers out there—suffered a security breach where attackers managed to worm their way into the systems where LastPass stored its source code. Let’s review the situation, and what your response should be.

First, let’s go over what we know.

LastPass Lost Their Intellectual Property, Not Customer or Employee Data

According to the password manager’s report, no customer or employee data was successfully accessed, with those responsible instead only gaining access to the password manager’s proprietary source code. We say “only” because many pieces of proprietary software these days use many, many open source components, all of which need to be documented even if some modifications were made.

So, while LastPass’ source code could be helpful to a prospective attacker, it isn’t going to be their magic bullet to get in.

This is also why open-source projects—where source code is openly shared so it can be examined and improved upon—are able to exist. Many of these open source projects have received security updates for vulnerabilities that went unnoticed, despite all eyes having access to the code.

Furthermore, a Decent Password Manager is Effectively Useless to Break Into

To explain this, let’s pretend that your password manager is like a giant bank. You go to the bank and deposit your money—your passwords and other credentials—into their vault for safekeeping.

The fear is that, should someone manage to break into the bank and access the vault, all of your money is there for the taking. This would be the case if your password manager was just storing the passwords you provided on their own servers. However, that isn’t how a reputable password manager functions.

To return to our bank analogy, the vault is really only filled with safety deposit boxes that are brought to you when you need to access them. You have your master key (the password to the vault) along with another, secondary form of identity authentication to provide that is generated on the spot, and required to access your safety deposit box.

Notice that the bank doesn’t have the key to your vault, meaning that they actually can’t allow someone else to access your safety deposit box, whether that someone is a criminal or a member of law enforcement.

This is how a password manager works: rather than storing your passwords, encrypted versions of your passwords are stored—and, with you being the only one with the password to your other passwords, the password manager can’t decrypt them on its own.

So Yes, It is Still a Good Idea to Use a Password Manager…

…and for a few reasons, too.

  • A decent password manager helps reinforce password best practices, in that it condenses the tens and dozens of passwords you should be remembering into a single password that is supported by multi-factor authentication. It’s no secret that many people shrug off the best practice of using a unique password for each account. Because the password manager stores them for you, you only need to remember the one password that gives you access to your password storage.

  • A decent password manager can help you come up with better passwords, preventing you from using recognizable patterns. I want you to do me a favor and think of a completely random password. Now, consider that password and see if you included any personal details or other information that could be associated with you. Did you stick to a pattern that you’ve used in your other passwords? A password manager can help you avoid these habits by generating longer, more complex passwords on your behalf.

  • A decent password manager will stop you from recycling passwords. Let’s say that a website you have an account on is hacked, and your login credentials are exposed in the data breach. If you’ve used the same login credentials elsewhere, that’s another however-many accounts that have been compromised. A password manager removes the temptation to use the same password everywhere, because it makes it easier for you to switch them up.

  • A decent password manager will help protect you from phishing sites. You and your password manager see websites differently, so while you may see Facebook or a Gmail login page, your password manager won’t, and will prompt you to not put in your credentials.

Make No Mistake, the LastPass Hack Isn’t Good News…

…but it also isn’t nearly as bad as it could have been. Voyage Technology is here to help you make sure that your security is as established as possible, protecting you from issues, threats, and attacks—including through the use of a reliable password manager. Give us a call at 800.618.9844 to find out what we offer to businesses.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Small Business Cybersecurity Microsoft Workplace Strategy Communication Passwords Data Backup Smartphone Backup Saving Money VoIP Business Management Smartphones Android Upgrade communications Mobile Devices Disaster Recovery Browser Data Recovery Managed Service Managed IT Services Social Media Microsoft Office Windows Network Tech Term Remote Internet of Things Automation Current Events Facebook Productivity Artificial Intelligence Cloud Computing Covid-19 Miscellaneous Gadgets Remote Work Server Managed Service Provider Outsourced IT Information Holiday Encryption Spam AI Employee/Employer Relationship Windows 10 Data Management Compliance Government Office Training Business Continuity Business Technology Windows 10 Virtualization Wi-Fi Blockchain Bandwidth Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Apple Gmail Managed Services App Voice over Internet Protocol Networking Employer-Employee Relationship Vendor Chrome Budget Tip of the week Conferencing WiFi Computing How To BDR Information Technology Office 365 Hacker BYOD Avoiding Downtime Applications Marketing Access Control Bring Your Own Device Help Desk Retail Healthcare Big Data Operating System Managed IT Services Risk Management Computers HIPAA Analytics Router Office Tips IT Support Augmented Reality Virtual Private Network Website Storage Password Health 2FA Monitoring Firewall Excel Document Management Remote Workers The Internet of Things Going Green Telephone Scam Data loss Social Cybercrime Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Customer Service Remote Monitoring End of Support Vulnerability Vendor Management Solutions Display Printer Paperless Office Windows 11 Infrastructure Mouse Data Storage Smart Technology Supply Chain Video Conferencing Administration Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Safety Managed IT Service Maintenance Downloads Antivirus Settings iPhone Printing Licensing Wireless Content Filtering Entertainment Vulnerabilities YouTube Data Privacy Images 101 Cryptocurrency Customer Relationship Management Multi-Factor Authentication Robot Mobility Telephone System Cost Management Virtual Desktop LiFi Hacking Data storage Presentation IT Management Meetings Outlook VPN Employees Physical Security Integration Wireless Technology Money Modem Humor User Tip Processor Computer Repair Mobile Security Holidays Word Sports Education Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Refrigeration Shopping Public Speaking SharePoint Mobile Computing Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Search Navigation Lithium-ion battery Management PCI DSS Chatbots Entrepreneur Best Practice Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Buisness Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Legal Server Management Regulations Compliance IT solutions Private Cloud Identity Business Growth Identity Theft Smart Tech Memes Co-managed IT Undo Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Cortana Business Communications Financial Data Error History Alt Codes Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement Downtime Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Application Social Network Telework Hosted Solution Cyber security CES Typing Tablet IoT Communitications Dark Web Cables IBM Trends Supply Chain Management Alert File Sharing Regulations Knowledge Dark Data Google Calendar Term Google Apps Google Drive Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Gamification Flexibility Notifications Staff Value Business Intelligence 5G Travel Social Networking Experience Legislation Shortcuts Google Docs Organization Unified Communications Techology Fileless Malware Digital Security Cameras Bitcoin Google Maps Smart Devices Running Cable Ransmoware Competition Google Wallet Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Windows 8 Assessment Electronic Health Records Laptop Permissions Workforce User Drones Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Halloween Fraud Meta IP Address Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Hacks Database Surveillance Scary Stories Virtual Assistant Outsource IT Fun Media Recovery Network Management Tech Support IT Technicians Virtual Machine Environment Deep Learning Cookies Monitors Cyber Monday Medical IT Hard Drives Proxy Server Reviews Domains Tactics Development Hotspot Transportation Small Businesses

Blog Archive