Government // Enterprise Architecture
News
8/28/2012
01:07 PM
Dino Londis
Dino Londis
Slideshows
Connect Directly
RSS
E-Mail
50%
50%

Top 5 Password Managers

2012 is the year of the password breach. Did you know there are tools to manage multiple, strong passwords so you don't have to? Here are BYTE's Top 5 P@$$w0rd Managers.
Previous
1 of 7
Next


2012 is the year of password theft, according to SecurityCoverage. The security software company says that in the first six months of 2012, online password breaches increased 300% over the same period in 2011.

Maybe you've done okay so far using the same passwords for years, or using the same password for multiple sites so you don't have to keep track of lots of different ones. Maybe you hope that password theft is so rampant that your password will slip past thieves unnoticed. But the time of hoping and crossing your fingers is over if, like many people, you've started storing corporate data in the cloud.

Until companies figure out a better way to protect their data in the cloud, the best solution is to enforce higher security with password managers, said Amber Gott, marketing associate and online community builder at LastPass. Awareness that the tools exist is the first step. "We still find there are plenty of people who aren't even aware that password managers exist," she said. "[But now ] ... we're seeing it cross over to your more average Internet user."

Password managers provide tools to encrypt text files that can store all your passwords that are not Web based, such as Windows and Outlook passwords, Lotus Notes passwords, administration passwords including local and domain accounts, BIOS passwords, encrypted hard drive passwords, cell phone and voicemail passwords, iPad and iPhone passwords, and so on.

Password managers promise greater security while improving the user experience. People get most excited about password managers' convenience, said Gott. "The security for a lot of people is an added benefit," she said.

The best password managers sync to the cloud across all dominant platforms and require multi-factor authentication. Other factors to consider when choosing one are cost, ease use, and extras. Of course, clouds are where much user data is breached. You've probably heard the victims' names: RSA, Sony, eHarmony, LinkedIn. What happens when a cloud-based password manager gets hacked?

LastPass was hacked in March 2011, right around the time Sony was breached. Unfortunately for Sony users, Sony stored passwords in clear text. LastPass, on the other hand, encrypts its passwords and came through relatively unscathed. In other words, the extra protection offered by password managers works.

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July14, 2014
Our new survey shows growing demand, flat budgets, and CIOs looking to cloud providers -- not to offload services, but to steal ideas.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join InformationWeek’s Lorna Garey and Mike Healey, president of Yeoman Technology Group, an engineering and research firm focused on maximizing technology investments, to discuss the right way to go digital.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.