Government // Enterprise Architecture
News
8/28/2012
01:07 PM
Dino Londis
Dino Londis
Slideshows
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Top 5 Password Managers

2012 is the year of the password breach. Did you know there are tools to manage multiple, strong passwords so you don't have to? Here are BYTE's Top 5 P@$$w0rd Managers.
Previous
1 of 7
Next


2012 is the year of password theft, according to SecurityCoverage. The security software company says that in the first six months of 2012, online password breaches increased 300% over the same period in 2011.

Maybe you've done okay so far using the same passwords for years, or using the same password for multiple sites so you don't have to keep track of lots of different ones. Maybe you hope that password theft is so rampant that your password will slip past thieves unnoticed. But the time of hoping and crossing your fingers is over if, like many people, you've started storing corporate data in the cloud.

Until companies figure out a better way to protect their data in the cloud, the best solution is to enforce higher security with password managers, said Amber Gott, marketing associate and online community builder at LastPass. Awareness that the tools exist is the first step. "We still find there are plenty of people who aren't even aware that password managers exist," she said. "[But now ] ... we're seeing it cross over to your more average Internet user."

Password managers provide tools to encrypt text files that can store all your passwords that are not Web based, such as Windows and Outlook passwords, Lotus Notes passwords, administration passwords including local and domain accounts, BIOS passwords, encrypted hard drive passwords, cell phone and voicemail passwords, iPad and iPhone passwords, and so on.

Password managers promise greater security while improving the user experience. People get most excited about password managers' convenience, said Gott. "The security for a lot of people is an added benefit," she said.

The best password managers sync to the cloud across all dominant platforms and require multi-factor authentication. Other factors to consider when choosing one are cost, ease use, and extras. Of course, clouds are where much user data is breached. You've probably heard the victims' names: RSA, Sony, eHarmony, LinkedIn. What happens when a cloud-based password manager gets hacked?

LastPass was hacked in March 2011, right around the time Sony was breached. Unfortunately for Sony users, Sony stored passwords in clear text. LastPass, on the other hand, encrypts its passwords and came through relatively unscathed. In other words, the extra protection offered by password managers works.

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.