Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Huge Credential Leak Underscores Need to Protect Passwords, Login IDs

    Written by

    Wayne Rash
    Published May 7, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      By now you already know that passwords are problematic. Getting your employees to create passwords that are even slightly secure is hard.

      Getting them to change to new passwords is even harder. Getting them to actually remember passwords instead of writing them on sticky notes and attaching them to their monitor is nearly impossible.

      This problem was made clear this past week when over 1 billion credentials were leaked from a variety of sources. Those credentials, which included user names and passwords along with other information, have been put up for sale on the Internet, and by now they’re likely in the hands of cyber-criminals who will eventually use them.

      In the near term, you know that you need to alert your users to change their passwords in the event that some of those stolen credentials belong to them. You may also want to check to see if their company email address is among those stolen, which you can do at sites such as Have I Been Pwned to see if their credentials are among those that have been stolen.

      Until now, there was another place to check such things called Pwnedlist.com, but according to security researcher Brian Krebs, that site was the source of many of those stolen credentials.

      Meanwhile, if you haven’t implemented some necessary security practices in regard to your company passwords, then by now it’s a must. This includes validating passwords so that your employees don’t use common words or character sequences, that they change passwords on a regular basis, and that managers pay attention to their workspaces closely enough that they can see whether the employees are writing passwords down on those sticky notes.

      There are a couple of other things that are important when managing passwords. One is that while it’s important that they not be common words, they still need to be something that your employees can remember so they aren’t tempted to write them down. This why you don’t insist on a 64-character hex number as passwords, since relatively few people can remember those.

      But perhaps more important, you need to start thinking of ways to stop using passwords, or at least supplement passwords with something else for the credentials necessary to access your network and data systems.

      An example of how this works is with some of the networks and data systems in the federal government. In most agencies, employees are provided with a smartcard-based identification card, which is called either a CAC card (for common access card) or a PIV card (for personal identity verification).

      Those cards include a chip similar to the one found in new credit cards that can be read by the agency’s security system to verify identity.

      Huge Credential Leak Underscores Need to Protect Passwords, Login IDs

      The card is used for building access and for access to data systems when inserted into a card reader attached to or installed in a worker’s computer. For computer uses, once the card is inserted into the reader, the user is then required to type in a PIN (personal identification number) code to gain access to the network.

      By now you’re thinking that such security systems might be fine for the government, but what about a small business? Fortunately, access control systems are available for businesses of all sizes and types. They may not all be smartcard systems like those in the government, but multifactor authentication doesn’t require government-scale resources to implement.

      For example, if you’ve got a reasonably new Apple iOS device, then you’ve got access to fingerprint recognition, which can be part of an app. The same is true with some newer Android devices, but it goes beyond that. Many new laptop computers include a fingerprint reader, as do some desktop computers.

      What really matters is that whatever device type you’re using, it needs to depend on something you have and something you know. That something you have might be your fingerprint, or it could be a smartcard or it might be an iris scan.

      Then you need to pair this with something that each person knows. That could be a PIN code such as what the federal government uses, or it could be a password or pass phrase.

      Perhaps more important, none of these methods of confirming identity is all that difficult or expensive to implement. But they do take commitment. That means that you will have to make your company’s security a priority.

      I could go on for a long time about why it’s necessary to create a culture of security in your company, but I’ve said all of that before. Now I’ll just say that it’s important for your employees to think of security in their day-to-day interactions. Perhaps you can offer some kind of security incentive to help that along.

      But what’s more important is to make sure your employees see that you’re also taking it seriously and that your security practices aren’t there just to annoy them. That means setting a good example of security in your daily activities. Don’t prop open the door to the server room. Don’t ignore password rules for your own account. Don’t make fun of password verification requirements.

      Moving away from something as simple and dangerous as what most companies do for password policies will require commitment, but it’s necessary to protect the company and, by extension, your employees.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×