Office +44 370 600 9700 | Helpdesk +44 370 600 9711 info@ejc.it

Facing-up to your responsibilities

Sep 18, 2017 | Newsletter, Resources

This month… more information about passwords, tech news & some useful links for your navigational and listening pleasure.

Password management – update

We’ve talked in-depth about passwords and password management before, but in the ever-changing landscape of IT security, there is always more to say, and the recent Equifax breach is a timely reminder – especially as it seems that someone was using ‘admin’ as login and password in Argentina…

Putting a face to a password

Facial recognition is also in the news at the moment, partly because of the new iPhone launch. There are concerns about security implications – yet many people don’t even bother to password-protect their phones, which is of far greater concern. On the whole we think there are more positives than negatives.

Security & friction

There is always a balance between security and ease-of-use. It would be possible to create a highly effective login system based on running DNA analysis every time you wanted to access Facebook, but we suspect usage might fall rapidly. This ‘friction’ is the biggest barrier to security: make it too hard and people will either not bother or find workarounds – but make it too easy and there’s no benefit. Creating a really complex password and then writing it on a post-it note on your monitor is an obvious example.

Reducing friction – Password managers

Reviewing recent breaches, it is apparent that the two biggest problems coming up again and again, are caused by users. Unsurprisingly these are weak passwords and re-used passwords. You should avoid both.

We strongly recommend using a password manager which enables you to easily use a different, complex password wherever you need one (Bitwarden is the one we use).

But in critical areas, passwords are not sufficient – you should also enable two-step verification. How does this work? For instance, each time you log into your bank account , you probably enter a code from an app on your your phone or a gadget on your key ring.  This confirms that the login is genuine.

Using two-step verification

Consider where two-step verification is valuable. We suggest it should always be used for accounts that if compromised could damage your reputation or cost you money. These might include:-

  • Password management (Fortunately, on Bitwarden, it only takes minutes to setup)
  • Online accounting systems
  • Email (when you log in on a different computer)
  • File systems – e.g. Dropbox
  • CRM systems – and anywhere you store customer data
  • Twitter, Facebook and other social media sites – depending on the implications of a breach

For other services – news websites etc. it’s perhaps less important, but you should use complex, unique passwords for each – the only way to securely do so is to use a password manager as already mentioned.

Read More From EJC

EJC Logo

Find Out How Technology Can Help You

To receive the latest advice, news and updates from our team, sign up here.

You have Successfully Subscribed!

Pin It on Pinterest