Tag Archive for: passwords

In recent years, password managers have become an indispensable asset for individuals and organisations, fortifying their IT infrastructure. However, while they deliver unparalleled convenience by securely storing and auto-populating login details and generating robust, unique passwords, they’re not without vulnerabilities.

For example, a Google advisory published this year highlighted a concerning flaw where several password managers could be deceived into auto-filling credentials on unauthorized sites. This scenario serves as a pressing reminder that risk often shadows convenience for companies and users alike. It’s crucial to understand these vulnerabilities and maintain constant vigilance, especially concerning website auto-fill features.

The dual edges of password managers

Password managers are sophisticated applications designed to store an extensive database of a user’s passwords, making the challenging task of remembering complex credentials a thing of the past. The primary key to this vault is a singular master password. Upon its input, users gain access to all their passwords within the manager.

Many of these utilities have automatic password generators, churning out complex credentials on demand. They offer the advantage of autofill capabilities, eliminating the manual chore of copying credentials – an advantage especially valuable for mobile device users.

However, given the potential vulnerabilities of the hosting servers, utilizing online password managers pose risks of their own. Hence, these tools considerably elevate security standards but don’t offer absolute invulnerability.

The pitfalls of automatic auto-filling

Though conceived for bolstering security, password managers auto-fill functionalities can inadvertently populate credentials into dubious or malicious websites.

Cybercriminals deceive these managers by skillfully manipulating website components or crafting persuasive phishing sites. This becomes a greater issue when users don’t put in their due diligence to ascertain the site’s authenticity and instead lean too heavily on the auto-fill feature. Such negligence could inadvertently hand over their credentials to adversaries, leading to potential account breaches.

Moreover, Google’s advisory in January unveiled that several password managers were susceptible to mistakenly auto-filling credentials on untrustworthy pages, posing a tangible risk of account breaches for users.

Specifically, Safari browsers, and extensions, such as Bitwarden and DashLane, were identified as potentially auto-filling login details within forms embedded in sandboxed iFrames. Fortunately, by the advisory’s release, these flaws had been addressed.

Understanding password managers

In light of these revelations, our security research team undertook comprehensive tests on prevalent browsers and password managers, evaluating their responses to same-origin and cross-origin iFrames, notably those unsandboxed.

Our observations highlighted Chrome and Firefox’s robust security stance – neither auto-filled credentials nor presented the option. Contrastingly, the Edge browser did auto-fill the username or email field, although it left the password field untouched.

For password managers, Passbolt and 1Password emerged as frontrunners in security, refraining from both auto-filling and offering the option to users. BitWarden and LastPass, whilst adopting a different approach, present users with a precautionary prompt when credentials may be forwarded to a divergent domain. This pivotal prompt allows users to auto-fill or decline, even in unsandboxed cross-origin iFrames.

Secure password management not only relies on users choosing strong passwords but also using due diligence when choosing a password manager and utilizing its functions. We strongly recommend users disable any auto-fill features and only manually trigger the feature when users are confident that the form presented is legitimate and should be filled.

Best practices for a robust password

Password security is paramount, not only for individual users but for the broader integrity of databases. While protective mechanisms can counteract some user lapses, individuals remain particularly vulnerable when employing weak passwords. So, what constitutes a robust password?

1. Incorporate alphanumeric characters: While recent studies suggest that simply adding upper and lowercase letters might not drastically enhance password strength, their inclusion, even marginally, can fortify defences. 

2. Embrace length: One of the most effective strategies is lengthening your password. Extended character sequences significantly challenge recovery attempts. Familiarise yourself with the latest methods advocating for comprehensive passwords. 

3. Integrate symbols: Current research underlines the effectiveness of symbols. Their inclusion proves more potent than switching between upper and lowercase letters. 

4. Prioritise unpredictability: Crafting unconventional passwords is key. Avoid the temptation of dictionary words or predictable sequences. Aim for originality, confounding potential intruders.

By adhering to these principles, users can significantly reduce their vulnerability in the digital sphere. Password management services require a two-way relationship. It’s important we don’t rely solely on this advanced technology and instead remain judicious and proactive in our online conduct. Despite being formidable allies in online security, they are not without their intricacies. Understanding the nuances and potential hazards linked to auto-fill features is central to user protection. We advocate for a more cautious stance – disable the automatic auto-fill function and opt for a manual trigger instead. Users should activate auto-fill exclusively when they are certain of the form’s authenticity.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar Pro

Convenience reigns supreme in the digital age, and password autofill is a major part of that. But what many people don’t realize is that using this feature can actually put their personal data at risk. By understanding why password autofill is so dangerous, you can take steps to safeguard your sensitive information from malicious hackers.

The risks of password autofill

Password autofill is a convenient feature found in most browsers and password managers. This feature allows users to automatically fill out login credentials on websites and applications. While it may seem like a time-saver, it’s crucial to be cautious when utilizing this feature.

Hackers can easily gain access to saved passwords and personal information stored in autofill, leaving users vulnerable to identity theft and other forms of cyberattacks. All they have to do is sneakily place an invisible form on a compromised webpage. When your browser or password manager automatically fills in your login details, then it’s game over for you and hackers win.

Autofill also tracks users

Did you know that the password autofill feature could be used to track your online activity? Irresponsible digital marketers can exploit this tool to keep tabs on your behavior. Similar to how hackers do it, they place hidden autofill forms on their websites and use them to collect your information without your consent, which they then sell to advertisers. While some may claim they’re not after your passwords, there’s still a chance that your sensitive data could be compromised.

How to protect yourself

When it comes to keeping your online accounts secure, you might want to turn off password autofill. This quick solution can help protect your personal information from prying eyes.

Here’s how you can disable this feature on different browsers:

  • Microsoft Edge: Go to Settings and click Profiles. From here, select Passwords and disable Offer to save passwords.
  • Google Chrome: Head to the Settings window and select Autofill. Disable Offer to save passwords and Auto Sign-in.
  • Firefox: Click Passwords from the browser’s menu. Click Options from the logins menu, which will lead you to the “Privacy & Security” panel. Under the “Logins and Passwords” section, uncheck Autofill logins and passwords.
  • Safari: Open Preferences and select the “Auto-fill” tab to turn off any autofill options related to usernames and passwords.

Being proactive and implementing more robust security strategies helps protect your personal data from malicious actors. Reach out to our cybersecurity experts for more information on staying safe online.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

With every new system we use and online account we create, we need to add another password to our ever-growing list. However, memorizing all these passwords is challenging and can lead to password fatigue. Single sign-on can be the solution to this problem.

What is single sign on?

Single sign-on or SSO is an authentication method that lets users access several applications and websites with a single set of login credentials. For example, if you log in to Gmail, SSO will automatically sign you into other Google applications, such as Analytics and AdSense.

How does SSO work?

SSO is built on the concept of federated identity, which allows multiple systems to share identification information. When a user logs in to a service with their SSO credentials, an authentication token is generated and stored on their browser or in the SSO provider’s servers. Any app or website that the user visits afterward will verify the user’s identity with the SSO provider, which will then deliver the user’s token to confirm their identity and grant them access.

This forms the foundation for modern SSO solutions that use protocols such as OpenID Connect and SAML 2.0.

What are the benefits of SSO?

Apart from being more convenient and simpler to use, SSO offers these key benefits:

Better password management
SSO makes it easier for workers to manage their login information since they only need to remember one set of credentials instead of dozens. And users only need to remember one password, they can create more unique and use stronger passwords for individual accounts, making it harder for cybercriminals to access and steal their information.

Improved password policy enforcement
Because password entry is centralized, SSO makes it easy for IT teams to enforce password security policies. For example, many businesses require employees to change their passwords regularly. Rather than having to reset several passwords across various applications and services each time, IT teams only need to reset one for each user.

SSO also helps IT administrators implement the reentering of login information after a given period to ensure an employee is still active on the signed-in device. This is a critical security measure for businesses, as it can prevent dormant accounts from being used to access company data.

Less time wasted recovering forgotten passwords
By utilizing SSO, IT staff can reduce the number of password recovery or reset requests they receive, and users can spend less time waiting for password resets. This can help raise employees’ productivity levels and allow IT personnel to focus on more important issues.

If you think SSO is ideal for your business, give us a call. Our experts are ready to help you.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

When it comes to protecting small businesses from cyberattacks, there is a constant balance between managing risk and applying limited resources between security, operational budgets, and convenience. Small businesses face critical resource decisions every day. Can my business afford to deploy optimal, strong cybersecurity solutions? And will my cybersecurity policies be a burden for my employees, trading partners, and customers?

Small business owners face significant challenges, and their most important daily responsibility is ensuring their businesses grow and thrive. As an industry, we have not done enough to connect the benefits of strong cybersecurity practices and policies to business expansion, resiliency, and long-term survival.

There is no area of cybersecurity more indicative of the challenges we face in threading the needle between security and business-friendly policies than usernames and passwords. We still overwhelmingly rely on an insecure means of account and network access that has proven inefficient and insecure for more than 30 years.

Multi-factor authentication (MFA)

We know there are more secure methods that can be deployed. Multi-factor authentication (MFA) bolsters security by requiring users to present more than one piece of evidence (credential) whenever the user logs in to a business account (ex. company email, payroll, human resources, etc.). MFA usually falls into three categories: something the user knows (a 15-character password), something the user has (fingerprint), or something the user receives (a code sent to the user’s phone or email account).

MFA works, but companies remain extremely reticent to deploy. The Global Small Business Multi-Factor Authentication (MFA) Study released by the Cyber Readiness Institute (CRI) found that only 46% of small business owners claim to have implemented MFA methods recommended by leading security experts, with just 13% requiring its use by employees for most account or application access.

Most companies implementing some form of MFA have not made it a requirement for all.

Only 39% of those who offer MFA have a process for prioritizing critical hardware, software, and data, with 49% merely “encouraging the use of MFA when it is available.”

According to Microsoft, 99.9% of account compromise attacks can be blocked simply using MFA. Yet, 47% of small business owners surveyed said they either didn’t understand MFA or didn’t see its value. In addition, nearly 60% have not discussed MFA with their employees.

Implementation of MFAs

Implementing MFA does not require hardware changes to company computers, mobile devices, or printers. Instead, there are numerous free and low-cost software-based tools users can download to their company and personal devices. For example, email providers usually offer (and encourage) MFA. Therefore, it can be as easy as clicking an option in email settings to turn on MFA.

There are several easy steps companies can take to implement MFA. First, organizations should update their policies and procedures with specific expectations. For example, all employees should implement MFA on their company email accounts. Next, hold workforce information sessions to communicate MFA policies and expectations. Employees need to know that it is easy to activate MFA on their accounts. Finally, designate someone in the organization who accepts the responsibility for cyber readiness to help employees troubleshoot as they begin using MFA.

Final Thoughts

At CRI, we fully believe strong cybersecurity is a business imperative, not an operational challenge. This requires a change in mindset from small business leaders, new questions must be asked, and behaviors need to change:

  • Can my business afford to suffer a cyberattack?
  • Will a cyberattack irreparably damage my brand?
  • Will a cyberattack burden my employees, customers, and trading partners?

Honestly answering these questions will change the importance of cybersecurity in a small business’s growth strategy.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from SmallBiz Technology SOURCE