Building a business case for password managers

Davey Winder ponders the best way for SMBs (and larger firms) to tackle the thorny issue of password security

Without the password alternatives, additional authentication factors, and some kind of password management system, the harsh truth is these small businesses and micro-enterprises will, undoubtedly, re-use passwords.

And, please, don't tell me a password management system that consists of a document filed away somewhere listing all the passwords within the enterprise is as safe as the next solution. Homebrew password solutions are best left to the hillbilly next door. There is no room for moonshine management in your business.

Whether you opt for an open source or proprietary password management solution makes little difference, as long as it has a proven track record and provides practical password creation, storage and retrieval.

Homebrew password solutions are best left to the hillbilly next door. There is no room for moonshine management in your business.

Advertisement
Advertisement - Article continues below

The argument I mentioned earlier about keeping all your passwords in one place is ripe for debate, but holds little real world water to me.

There are plenty of good software solutions to choose from, and always one that will be a good match for any given smaller enterprise requirement. This means there are those where the password vault is stored locally, and those that use the cloud for 'anywhere/anytime' access.

The latter gets the most stick in the easy target stakes, but Heartbleed has blown a huge hole in that argument.

Most password manager services, even those who admit to having used an OpenSSL implementation, have stated that users don't need to change their master passwords.

This is because master passwords are never sent to the servers. Instead you will find something like the password being appended to an email or login validator and put through a salted one way hash that is sent to the server for authentication instead.

These hashes are as close to impossible as it gets to be reverse engineered. Oh, and they get signed by a key which is separate from the SSL key for good measure.

Players in the password manager market know their continued existence relies on users trusting them to know a bit about security, and implement it in such a way that the vault remains safe.

Will I continue to recommend password manager software to the smallest of enterprises on a small budget and with limited technical expertise? You betcha!

Of course, if your enterprise can run to using password management software and some form of two factor authentication as well, then I'd recommend that even more.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019