SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, William Schmarzo, Yeshim Deniz

Blog Feed Post

How to Protect What Matters Most Online: Your Logins and Passwords

Security Settings

There are a few ways to protect what matters most online: your logins and passwords.

What if I told you that your browser’s saved passwords weren’t nearly as secure as you thought?

If you use Google Chrome (and you should, because it’s pretty regularly rated as the best browser you can use), anyone can uncover any of your saved passwords with a single click. Now, if you’re like me and have a computer that only you use, that’s not a big issue. But for anyone who shares a computer or uses an even remotely public computer? That’s scary stuff. A writer on the Guardian said that he could uncover 52 passwords in 57 seconds, adding, “I’m an amateur at this hacking stuff.”

In under a minute, anyone can go into Chrome’s settings and click “Show” next to a site with a saved password. That’s all it takes for someone to get the info they need to forever ruin your online persona – a few clicks and virtually no time at all. Chrome may be a great browser, but it’s certainly not the most private on a shared computer. Don’t worry, though: there are other options.

Firefox’s ‘Master Password’

My personal browser of choice is Firefox. I’ve been using Firefox since before Chrome was a thing, even though I know Chrome is quicker and (usually) less of a resource hog. I won’t spend time comparing the two browsers, but if you’re using Chrome and this startling lack of security is enough to scare you into a switch, Firefox might be a good place to wind up.
Firefox Master Password
Firefox has a feature called ‘Master Password.’ Easily found in the Security settings of the browser’s options, it’s simple and effective. It’s built directly into the browser. You don’t need to install any plug-ins or third-party programs to make use of it, and you don’t have to pay a dime. It protects you in two ways: it won’t use a saved password to log into a site without first typing in the master password, nor will it let anyone see your saved passwords in the settings menu without first gaining access.

RoboForm

But maybe you don’t use Firefox and don’t want to make the switch. Maybe you’ve grown so attached to Chrome that you can’t picture life without it. Whatever your reason, there are third-party programs that can help secure your logins.

One program I recently tried was RoboForm, which links to your browsers and stores your login information more securely behind its own master password. It works on multiple browsers and multiple platforms (both desktop and mobile) and offers one-click form filling, mobile support and access from anywhere. My experience using it last week was nothing but positive, and it’s very intuitive.

RoboForm has three tiers of its program available: Free, Everywhere and Desktop.

  • The free version gives you access on multiple computers and mobile devices, all in sync, for up to 10 logins. We all have far, far more than 10 logins. RoboForm Free probably isn’t a permanent option for you (unless you just want to protect a handful of your most prized accounts), but it’s a great way to try the program without a commitment. It works on Windows, Mac, iOS and Android, and keeps your logins synced across all platforms.
  • The “Everywhere” tier costs $9.95/year (it looks like it’s on sale from its normal price of $19.95/year) and is the free version with no restrictions. It offers unlimited passwords and bookmarks, unlimited form filling and Safenotes, and unlimited sync and backup. If you like what the free version provides and want to keep all of your devices in sync, ‘Everywhere’ seems like a solid choice.
  • The final option is the “Desktop” tier, which has a one-time fee of $29.95 for one license (and $9.95 for each license after that). This option doesn’t offer mobile support, but instead focuses on “single computer use without online storage or syncing” and is “perfect for single computer users” according to RoboForm’s site.

Ultimately, your logins and passwords are your own responsibility. If you don’t feel the need to ramp up security and inconvenience yourself with a master password, that’s your prerogative. But if you want that extra layer of security, switching to Firefox or using a program like RoboForm is a good way to defend yourself.

A dedicated enough hacker will uncover your saved passwords no matter how secure they are, but you don’t leave your front door open when you go out for the night, do you?

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Stories
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, discussed the best practices that will ensure a successful smart city journey.
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, highlighted the current challenges of these transformative technologies and shared strategies for preparing your organization for these changes. This “view from the top” outlined the latest trends and developments i...