Over the years Ive tried to get better at my use of passwords, especially since Im supposed to tell other people how to manage security. I have to confess: Im not where I want to be, and I bet you arent either.
Do you use complex passwords for all of your logins where confidential information is at stake? Do you change them periodically to some other sufficiently long and complex word?
I ask around, and Im convinced that the only people who do such things are forced to do so by a company policy enforced by IT.
And in such cases, the company has an increased burden of support for the inevitable lost passwords.
There are a number of technological solutions. At the personal level there are password managers such as Norton Password Manager and the open-source Password Safe utility, but these have a number of limitations, chief among them the fact that their own master password becomes a central point of compromise through which all the other passwords are accessible.
Such password managers are also generally limited to use on one computer. I know this isnt good enough for me.
USB key devices are a focus for the security industry to address these limitations. A number of companies have developed a variety of solutions. The most obvious approach is that in Microsofts Fingerprint Reader.
However, as the products license says, this is not really as much a security device as a convenience device, since it doesnt replace passwords as much as use the fingerprint to control access to a password cache.
Companies like UPEK have a more sophisticated approach, integrating security all the way up the software stack rather than just mimicking a password. Their hardware is built into certain ThinkPad models.
But while biometric authentication might fit well in a corporate network, there is no (to my knowledge) serious work under way to allow true biometric authentication for the sorts of Internet logins normal people use, such as for their bank.
And its not necessarily the answer, anyway. If a fingerprint is the only factor, then it, too, can be mimicked and stolen in a phishing attempt.
So theres just no way around these things being complicated.
Either users have to manage increasing numbers of passwords while under assault from malware and phishing attacks, or they have to manage complicated and expensive security mechanisms that they will have a hard time appreciating.
I like the odds for the phishers better than for security.
Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983. He can be reached at larryseltzer@ziffdavis.com.