Building a business case for password managers

Davey Winder ponders the best way for SMBs (and larger firms) to tackle the thorny issue of password security

Without the password alternatives, additional authentication factors, and some kind of password management system, the harsh truth is these small businesses and micro-enterprises will, undoubtedly, re-use passwords.

And, please, don't tell me a password management system that consists of a document filed away somewhere listing all the passwords within the enterprise is as safe as the next solution. Homebrew password solutions are best left to the hillbilly next door. There is no room for moonshine management in your business.

Whether you opt for an open source or proprietary password management solution makes little difference, as long as it has a proven track record and provides practical password creation, storage and retrieval.

Homebrew password solutions are best left to the hillbilly next door. There is no room for moonshine management in your business.

Advertisement - Article continues below
Advertisement - Article continues below

The argument I mentioned earlier about keeping all your passwords in one place is ripe for debate, but holds little real world water to me.

There are plenty of good software solutions to choose from, and always one that will be a good match for any given smaller enterprise requirement. This means there are those where the password vault is stored locally, and those that use the cloud for 'anywhere/anytime' access.

The latter gets the most stick in the easy target stakes, but Heartbleed has blown a huge hole in that argument.

Most password manager services, even those who admit to having used an OpenSSL implementation, have stated that users don't need to change their master passwords.

This is because master passwords are never sent to the servers. Instead you will find something like the password being appended to an email or login validator and put through a salted one way hash that is sent to the server for authentication instead.

These hashes are as close to impossible as it gets to be reverse engineered. Oh, and they get signed by a key which is separate from the SSL key for good measure.

Advertisement - Article continues below

Players in the password manager market know their continued existence relies on users trusting them to know a bit about security, and implement it in such a way that the vault remains safe.

Will I continue to recommend password manager software to the smallest of enterprises on a small budget and with limited technical expertise? You betcha!

Of course, if your enterprise can run to using password management software and some form of two factor authentication as well, then I'd recommend that even more.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now

Most Popular

data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
cyber security

If not passwords then what?

8 Jan 2020
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020