Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
GW Introduction to Google Drive Security and Smart Sharing Practices.
SOCIAL ENGINEERING AND INFORMATION PROTECTION BEST PRACTICES.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Why Comply with PCI Security Standards?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Banking Safely. PIN and Password Selection and Protection Select unique digits (number and letter combinations DO NOT SELECT your birthdate, telephone.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Nothing is Safe 1. Overview  Why Passwords?  Current Events  Password Security & Cracking  Tools  Demonstrations Linux GPU Windows  Conclusions.
Quick Reference Guide Welcome TEST USER Version_NSU_ HELP RETIREMENT MANAGER DEMO FEEDBACK.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
CIS 450 – Network Security Chapter 8 – Password Security.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
INTERNET SAFETY FOR KIDS
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Understanding Security Policies Lesson 3. Objectives.
Securing the Cloud Authentication Perspective. Moving to the Cloud is like Moving your data from your own personal safe, to a safety deposit box.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
PASSWORD SECURITY A Melbourne Athenaeum Library
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
LastPass Password Management
IT Security Awareness Day October 19, 2016
Understanding Security Policies
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
DATA SECURITY FOR MEDICAL RESEARCH
Key words: Secure | Password | Character
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
System Access Authentication
Common Methods Used to Commit Computer Crimes
Ways to protect yourself against hackers
Password Security by Jordan D. v2.0
Cybersecurity Awareness
IT Security awareness Training.
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Setting up an online account
TallyVault & Password Policy
Chapter 3: Protecting Your Data and Privacy
Legal firms are very much dependent on the legal case management software, to manage the workflow, business process and the documents. The law firm office.
What is Phishing? Pronounced “Fishing”
Partner Facing Demo.
Keeping your passwords safe
Presentation transcript:

Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security

What We Will Cover: Password review Password Management Password Management Myths Flaws of Gray Matter Password Management What are the benefits of a Password Manager Password Manager Recommendations Demo

Password Review The most commonly used authentication mechanisms

Password Review The most commonly used authentication mechanisms Usually considered one of the weakest security mechanisms available

Password Review The most commonly used authentication mechanisms Usually considered one of the weakest security mechanisms available Users usually choose passwords that are easily guessed

Password Review The most commonly used authentication mechanisms Usually considered one of the weakest security mechanisms available Users usually choose passwords that are easily guessed Users write the passwords down on a sticky note and clearly hide under the keyboard

Password Review The most commonly used authentication mechanisms Usually considered one of the weakest security mechanisms available Users usually choose passwords that are easily guessed Users write the passwords down on a sticky note and clearly hide under the keyboard This is where Password Management steps in

Password Management What can you do to protect your credentials? 1.Never provide your password to anyone Nobody should ask for your password, not even other staff such as Help Desk. This includes via , phone, or in person. 2.Change your password frequently and use strong password Dictionary attack - Files of thousands of words are compared to the user’s password until a match is found. Many people choose short passwords (7 characters or less). Therefore dictionary attack is often successful to crack their passwords.

Password management 3.Avoid re-using or duplicating passwords between work and personal accounts Dropbox breach – Cloud storage service. Customers receiving spam advertising online casinos. o The customer data were contained in a document that was stolen from the Dropbox account of one of the company's employees o Attacker managed to gain access to the account because of a different attack on another website o The account holder used the same password for both accounts You should not reuse passwords across multiple systems.

Password Management Myths Stored passwords in your browser are secure. Incorrect: No encryption provided and easy to recover. Storing passwords in a Excel or Word document that is natively encrypted is a secure practice. Incorrect: Encryption is getting better than it used to be but you do not have the functionality. Writing down passwords is a secure practice if kept hidden. Incorrect: No encryption and easy to steal.

Password cracking monster

Flaws of Gray Matter Password Management Password Strength: Having to remember large complex strings. Quantity of Accounts: Having to manage a large number of accounts. Password Redundancy: Reusing passwords across applications/systems. Underutilized Accounts: Remembering passwords for accounts rarely used.

What are the Benefits of a Password Manager Password Storage: Store complex passwords without having to remember them. Strong Industry Standard Encryption: AES Stronger Authentication Security: Ability to Leverage Multi-Factor Password Generation: Ability to create very strong/complex passwords.

What are the Benefits of a Password Manager Password Expiration: Configure password expiration reminders. Password History: Configurable unique password enforcement. User-Friendly Password Usage: Ability to copy/paste, auto password cache cleanup, and URL storage.

Password Manager Recommendations Password Safe: Kee Pass:

Password Manager DEMO

Contact us at … Send you questions, comments and suggestions to …