Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

The Password and Beyond

contraseñas

If you are one of those who have a lot of passwords or don't know how to manage them, this article is for you.

By Gigi Agassini, CPP*

We often hear and/or read about the risks and challenges that come with rapid technological evolution. Our daily activities at work, in family, social and personal life are increasingly surrounded by systems and applications that require the use of passwords and users to access them, which has become a challenge from which we are still reluctant to take actions that allow us to manage "those risks". as is the generation of strong and unique keys.

The above (although done in a different way) is not something that emerged with the digital age, it simply evolved. In ancient Greece, the Roman army used "swords" as a password to prove that you were a member of that unit.

Even for the forbidden, passwords were also used; When there were taverns where alcohol was sold clandestinely, the use of a card or a phrase was necessary to allow you access and identify yourself as authorized.

In the early 1960s, a professor of computer science at MIT, Fernando Cobartó, created the first digital password as a solution to a design problem for sharing a computer with multiple users1. As we become more connected, the creation of accounts and passwords becomes overwhelming, so much so that it is easy to forget the username, the email with which we register and, of course, the password to access the system or service we require.


With the popularity of the internet, even the same systems began to ask us for longer passwords; Surely you chose or continue to choose words that are easy to remember (for you) that are related to yourself: the name of a family member, the street or city where you live, the name of your pet, etc., but suddenly we are asked for at least one capital letter, so surely the initial of "your" secret word became capitalized.

But it doesn't end there, with the greater popularity of the internet, now the systems ask us for a number, which I can assure you that for "ease" you include the 1 at the end of your secret word. However, the increase in identity theft, fraud and unauthorized access leads to the reinforcement of the systems so they ask you to include at least one "special character", and I can assume that your special character is the exclamation mark ( ! ) at the end of the 1 of your secret word. This, in addition to the fact that you only use that "password" for all your accounts, "assuring" that you will not forget it.

If you can relate to the above, believe me... You're not alone. As I mentioned, the incremental use of the internet has become a difficult mountain to reach and I regret not having better news, because as we have experienced in recent years it will only continue to increase.

The main reason for requiring longer passwords, with special characters, etc., is simply to increase the security of access to your information, which comes with some responsibility, and best practices tell us the following:
- Create different passwords for each account.
- Passwords should be long, containing capital letters, numbers, and special characters.
- Not to use personal or personally identifiable information.
- Change passwords on a regular basis.
- Keep passwords in a safe place and don't share them.

And it is precisely this last point in which we fail the most as users, as it is common to do exactly the opposite of what good practices suggest to us, in addition to the use of a unique password for all existing accounts.

The question then becomes: how do you manage all passwords securely and efficiently? If you're someone who still copies and pastes passwords from a notepad, it's time to think of something that can help you protect them more effectively.

Password managers
And this is where applications such as password managers provide a single master key to simplify and protect your accounts, which have become an essential tool in the digital age, offering a secure solution for the management of multiple online credentials and although there are many opinions about it, we are going to analyze what they are, how you can use them and what the risks are.



They offer significant benefits, such as the automatic generation of complex and unique passwords for each account, secure synchronization between devices, storage of keys in an encrypted database, and the ability to access all your passwords with a single master password. It's especially useful for people who have difficulty remembering complex passwords or who use devices on multiple platforms and aren't in the habit of changing them regularly. However, in highly controlled environments or where advanced authentication systems are used, the need may be less or non-existent.

A password manager accompanies you as you browse the web, carrying your passwords securely like a ring of keys. These programs store usernames and passwords in a database and when you need a new password or change the existing one you can easily get a secure suggestion that will be stored automatically in the manager.

Some of the advantages, in addition to the management of users and unique passwords for your online accounts, can be:
- Time-saving.
- Multi-device function and operating systems.
- Protecting your identity.
- Notification about potential phishing websites.
- Identification when a password is compromised.
- Notification if you have the same password on multiple accounts.
- Recognition if your keys are weak and easy to guess.

And although password managers offer many advantages, a large percentage of users still do not trust them, the reasons are many and varied but the main one is the lack of trust that everything is centralized and there is a risk that a hacker will breach security and access all the information2.

Password managers, like all systems, are not without challenges and have associated risks, so it is important when choosing the application you will use to consider relevant features such as database encryption, the place where all key and user information will be stored; multi-factor authentication, because the information it contains, is transcendental to this function; Zero knowledge refers to the fact that the application itself does not know what the key is to unlock the vault and you are the only one who knows that information; Synchronization and compatibility with operating systems, applications, and devices3.

The above surely leads you to the question: what are the most secure password managers? Well, without a doubt it is one of the most important questions to take into account when choosing the one you will use.

Definitely, many administrators make great efforts and designs to provide the greatest security to the application, but no one is perfect, and it is known that some have had problems. LastPass, in December 2022, for example, (while a popular and highly reputable option), suffered a security breach4 and while the company assured users that no passwords were accessible, it's still a cause for concern.

Most password managers are very secure and use the most advanced encryption methods to store your keys securely. As I mentioned earlier, zero-knowledge architecture is one of the basic principles for managers to keep their passwords as secure as possible. This means that no one but the user has access to the passwords contained in the encrypted vault. Complex encryption algorithms are used, and as with everything, there are several methods. Some administrators, such as NordPass, use something called XChaCha20, which is military-grade and considered to be at the forefront of today's encryption technology5.

He believes that, as with any piece of digital technology, how we use it goes a long way in determining how secure it remains. Make sure you access your administrator from a safe and secure network (don't forget that public Wi-Fi networks are a great danger), and that you use the best malware removal and antivirus tools for your system.

Remember that applications are efficient according to the need and purpose of use; Key managers are no strangers to this, there are many options on the market, so before you begin your evaluation, it's important that you research the features and functionalities that are best for your needs.

You can find managers for personal use, for family use, free of charge, for small and medium-sized businesses, to name a few. Don't forget to include in your assessment what operating system(s) you use, devices, applications and check their compatibility with the password manager.
If you are still one of those who still use a single password for everything and with information that identifies you, I suggest you move to a key manager that suits your needs, you will undoubtedly find a good alternative.

Keeping your environment as safe as possible and developing habits that allow you to efficiently manage the risks to which you are constantly and daily exposed is your responsibility.
References: 1. Luopen LATAM.
2. National Cybersecurity Alliance
3. National Cybersecurity Alliance
4. DigitalTrends.
5. TechRadar

See you next time!

- Publicidad -

* Gigi Agassini, CPP
International Security Consultant
GA Advisory
[email protected]

Duván Chaverra Agudelo
Author: Duván Chaverra Agudelo
Jefe Editorial en Latin Press, Inc,.
Comunicador Social y Periodista con experiencia de más de 16 años en medios de comunicación. Apasionado por la tecnología y por esta industria. [email protected]

No thoughts on “The Password and Beyond”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Entrevista a Alex Salinas, de Bolide Technology Group

El Vicepresidente de Bolide, Álex Salinas, habló sobre la participación de la compañía en la Feria Internacional de Seguridad de Bogotá ESS+. El profesional realizó un balance tras el evento y nos contó cuáles fueron las soluciones que el fabricante global presentó en la ciudad de Bogotá.

Webinar: Para todas sus necesidades de seguridad

https://www.ventasdeseguridad.com/2... Para todas sus necesidades de seguridad Por: Eduardo Cortés Coronado, Representante Comercial en México - SECO-LARM USA INC Conozca la gama de productos más vendidos y de alta calidad de SECO-LARM que utilizan las empresas profesionales de seguridad, para así garantizar soluciones confiables y duraderas.

Webinar: Seguridad y transporte conectado: Sistemas predictivos para proteger y optimizar las rutas

https://www.ventasdeseguridad.com/2... Modera: Héctor Romero, Presidente de Círculo Logístico y Director General de TLR Logística Ponentes: Rafael Escobar, Channel Manager IoT/M2M Alai Secure León Rojas Madrid, CEO Lemad Logistics Jorge González, Commercial manager Telemetría de México Introducción y datos globales del mercado del transporte y la logística (México, Latam y Europa). Las nuevas tecnologías, con el objetivo de contribuir a la mejora de procesos y toma de decisiones, se abren paso para garantizar la seguridad de vehículos del transporte y la logística (telemetría y telemática vehicular, diseño y optimización de rutas…) Ir de la mano de un operador especializado en comunicaciones M2M/IoT como Alai Secure es clave para asegurar la estabilidad y disponibilidad del servicio y garantizar la conectividad durante toda la ruta.

Top 3 noticias más importantes de la industria de la seguridad electrónica

Entre los hechos destacados de esta semana se encuentra la realización de IntegraTEC México, el evento para integradores de tecnologías; así como la fusión empresarial de Milestone Systems con Arcules y la convocatoria para aspirar a las becas ofrecidas por el Foro SIA Mujeres en Seguridad. #Seguridad #SeguridadElectrónica #Videovigilancia #VentasDeSeguridad

Webinar: Inteligencia Artificial en NVR & Cámaras Enforcer

https://www.ventasdeseguridad.com/2... Tema: Inteligencia Artificial en NVR & Cámaras Enforcer Por: Eduardo Cortés Coronado, Representante Comercial en México - SECO-LARM USA INC Fecha: Martes 28 de mayo, 2024 Hora: 10.00H (Colombia) 09:00H (México) Conozca cómo sacar ventaja de las funciones de inteligencia artificial en NVR´S 4K & cámaras IP enforcer, disuación activa, reconocimiento facial, reconocimiento de matriculas vehiculares, salidas alarma etc.
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter