{"componentChunkName":"component---src-templates-tag-js","path":"/tags/password-management/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":11,"edges":[{"node":{"fields":{"slug":"/identity/what-is-password-vault-how-does-it-work/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In today's digital age, where almost everything is connected to the internet, cybersecurity has become a growing concern for individuals and organizations alike. </p>\n<p>While most businesses struggle with securing sensitive business information, many deal with security concerns about <a href=\"https://www.loginradius.com/customer-privacy/\">customer privacy</a>.</p>\n<p>One of the most significant security concerns is using a weak or the same password across multiple accounts, making it easy for hackers to gain unauthorized access to sensitive information.</p>\n<p>To address this issue, password vaults have become a popular solution for securely storing passwords. Password vaults are robust security software that helps store and manage passwords most securely by leveraging encryption techniques. </p>\n<p>Let’s discuss password vaults, how they work, their pros and cons, and how to implement them.</p>\n<h2 id=\"what-is-a-password-vault\" style=\"position:relative;\"><a href=\"#what-is-a-password-vault\" aria-label=\"what is a password vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Password Vault?</h2>\n<p>A password vault, a password manager, or enterprise password vault, is a software application that stores and manages passwords in an encrypted database. </p>\n<p>The user creates a master password, which is used to unlock the vault and access all the stored passwords. The password vault holds passwords in an encrypted format, ensuring only authorized users can access them.</p>\n<h2 id=\"are-password-vaults-a-good-idea\" style=\"position:relative;\"><a href=\"#are-password-vaults-a-good-idea\" aria-label=\"are password vaults a good idea permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Are Password Vaults a Good Idea?</h2>\n<p>Using a password vault is an excellent idea because it helps users create and manage unique, strong passwords for each account. </p>\n<p>Moreover, password vaults can also <a href=\"https://www.loginradius.com/blog/identity/how-to-choose-a-secure-password/\">generate complex passwords</a> that are difficult to crack. Since the user only has to remember one master password, it eliminates the need to remember multiple passwords.</p>\n<p>This helps them to use complex passwords for different accounts without the need to remember every password individually. </p>\n<h2 id=\"types-of-password-vaults\" style=\"position:relative;\"><a href=\"#types-of-password-vaults\" aria-label=\"types of password vaults permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Password Vaults</h2>\n<p>Password vaults come in various types, each catering to different needs and preferences. Here are some common types:</p>\n<h3 id=\"local-password-vaults\" style=\"position:relative;\"><a href=\"#local-password-vaults\" aria-label=\"local password vaults permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Local Password Vaults:</h3>\n<ul>\n<li>These password vaults store encrypted passwords locally on the user's device, such as a computer or smartphone.</li>\n<li>They are convenient for individuals who prefer full control over their password storage.</li>\n<li>Users manage their passwords without relying on a cloud-based service.</li>\n</ul>\n<h3 id=\"cloud-based-password-vaults\" style=\"position:relative;\"><a href=\"#cloud-based-password-vaults\" aria-label=\"cloud based password vaults permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cloud-Based Password Vaults</h3>\n<ul>\n<li>Cloud-based password vaults store encrypted passwords on remote servers.</li>\n<li>They offer the advantage of accessing passwords from any device with an internet connection.</li>\n<li>These vaults often synchronize devices, ensuring updated passwords are available everywhere.</li>\n</ul>\n<h3 id=\"enterprise-password-vaults\" style=\"position:relative;\"><a href=\"#enterprise-password-vaults\" aria-label=\"enterprise password vaults permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enterprise Password Vaults</h3>\n<ul>\n<li>These password vaults are designed for organizations to manage and secure employee passwords.</li>\n<li>They often come with additional features like role-based access control and auditing capabilities.</li>\n<li>Enterprise password vaults enhance security for businesses managing numerous accounts and access credentials.</li>\n</ul>\n<h3 id=\"biometric-password-vaults\" style=\"position:relative;\"><a href=\"#biometric-password-vaults\" aria-label=\"biometric password vaults permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Password Vaults</h3>\n<ul>\n<li>Biometric password vaults use unique physical characteristics such as fingerprints or facial recognition to access passwords.</li>\n<li>These vaults provide an extra layer of security, requiring the user's biometric data for authentication.</li>\n<li>Biometric password vaults are becoming more popular due to their convenience and enhanced security.</li>\n</ul>\n<h2 id=\"can-a-password-vault-be-hacked\" style=\"position:relative;\"><a href=\"#can-a-password-vault-be-hacked\" aria-label=\"can a password vault be hacked permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Can a Password Vault be Hacked?</h2>\n<p>Password vaults are generally secure because they use robust encryption algorithms to protect stored passwords. However, no system is entirely immune to hacking. </p>\n<p>A determined hacker could access a password vault by exploiting a system vulnerability or obtaining the master password. </p>\n<p>Hence, to minimize the risk of a breach, users should choose a reputable password vault provider and follow best practices for creating a strong master password.</p>\n<h2 id=\"common-misconceptions-about-password-vaults\" style=\"position:relative;\"><a href=\"#common-misconceptions-about-password-vaults\" aria-label=\"common misconceptions about password vaults permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Misconceptions about Password Vaults</h2>\n<p>Despite their advantages, several misconceptions surround password vaults. Let's debunk some of these misconceptions:</p>\n<h3 id=\"only-for-tech-experts\" style=\"position:relative;\"><a href=\"#only-for-tech-experts\" aria-label=\"only for tech experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Only for Tech Experts</h3>\n<ul>\n<li>Contrary to this belief, password vaults are designed to be user-friendly for individuals of all technical levels.</li>\n<li>They offer simple interfaces for adding, managing, and accessing passwords, making them accessible to anyone concerned about security.</li>\n</ul>\n<h3 id=\"risk-of-complete-lockout\" style=\"position:relative;\"><a href=\"#risk-of-complete-lockout\" aria-label=\"risk of complete lockout permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risk of Complete Lockout</h3>\n<ul>\n<li>Some users fear that forgetting their master password will result in a complete lockout from all their accounts.</li>\n<li>However, reputable password vaults often offer account recovery options, such as security questions or account recovery keys.</li>\n<li>It's essential to set up these recovery methods during the initial setup of the password vault.</li>\n</ul>\n<h3 id=\"not-secure\" style=\"position:relative;\"><a href=\"#not-secure\" aria-label=\"not secure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Not Secure</h3>\n<ul>\n<li>A common misconception is that password vaults are not secure and can be easily hacked.</li>\n<li>In reality, password vaults use robust encryption algorithms to protect stored passwords.</li>\n<li>Choosing a reputable password vault provider and following best practices significantly reduce the risk of unauthorized access.</li>\n</ul>\n<h3 id=\"limited-to-password-storage\" style=\"position:relative;\"><a href=\"#limited-to-password-storage\" aria-label=\"limited to password storage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Limited to Password Storage</h3>\n<ul>\n<li>While the primary function of a password vault is to store passwords securely, many modern vaults offer additional features.</li>\n<li>These features may include password strength analysis, automatic password generation, and secure note storage.</li>\n<li>Password vaults are evolving into comprehensive digital identity solutions.</li>\n</ul>\n<h2 id=\"how-does-a-password-vault-work\" style=\"position:relative;\"><a href=\"#how-does-a-password-vault-work\" aria-label=\"how does a password vault work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Does a Password Vault Work?</strong></h2>\n<p>A password vault encrypts and stores the user's passwords in a database. The encryption process makes it easier for anyone to access the passwords with the correct decryption key.</p>\n<p>The user's master password decrypts the database and accesses the stored passwords. Some password vaults also offer features such as <a href=\"https://www.loginradius.com/blog/identity/how-to-setup-2fa-in-online-accounts/\">two-factor authentication</a>, which adds an additional layer of security.</p>\n<h2 id=\"how-does-a-password-vault-work-1\" style=\"position:relative;\"><a href=\"#how-does-a-password-vault-work-1\" aria-label=\"how does a password vault work 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does a Password Vault Work?</h2>\n<p>A password vault encrypts and stores the user's passwords in a database. The encryption process makes it easier for anyone to access the passwords with the correct decryption key. </p>\n<p>The user's master password decrypts the database and accesses the stored passwords. Some password vaults also offer features such as <a href=\"https://www.loginradius.com/blog/identity/how-to-setup-2fa-in-online-accounts/\">two-factor authentication</a>, which adds an additional layer of security.</p>\n<h2 id=\"pros-and-cons-of-using-a-password-vault\" style=\"position:relative;\"><a href=\"#pros-and-cons-of-using-a-password-vault\" aria-label=\"pros and cons of using a password vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pros and Cons of Using a Password Vault</h2>\n<p>There are several pros and cons to using a password vault:</p>\n<p><strong>Pros:</strong></p>\n<ol>\n<li><strong>Security:</strong> A password vault provides high protection for passwords, which are encrypted and stored securely.</li>\n<li><strong>Convenience:</strong> With a password vault, users don't have to remember multiple passwords, which can be challenging.</li>\n<li><strong>Time-saving:</strong> Password vaults can save time as users don't have to spend time resetting forgotten passwords.</li>\n<li><strong>Encourages good password habits:</strong> With the ability to generate and store complex passwords, a password vault enables users to create strong, unique passwords for each account.</li>\n</ol>\n<p><strong>Cons:</strong></p>\n<ol>\n<li><strong>Vulnerability to hacking:</strong> Although password vaults are secure, they are not immune to hacking. If the master password is compromised, all the stored passwords can be accessed.</li>\n<li><strong>Dependence on a single password:</strong> As all the passwords are stored behind a single password, if the master password is forgotten, there may be no way to recover the passwords.</li>\n<li><strong>Difficulty in migrating:</strong> If a user wants to switch to a different password vault or password manager, it can be difficult to migrate all the stored passwords.</li>\n<li><strong>Cost:</strong> Some password vaults require a subscription fee, which can disadvantage users who want to avoid paying for the service.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-GD-to-MFA.webp\" alt=\"EB-GD-to-MFA\"></a></p>\n<h2 id=\"how-to-implement-password-vaulting\" style=\"position:relative;\"><a href=\"#how-to-implement-password-vaulting\" aria-label=\"how to implement password vaulting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Password Vaulting</h2>\n<p>Implementing a password vault involves the following steps:</p>\n<h3 id=\"1-choose-a-password-vault-provider\" style=\"position:relative;\"><a href=\"#1-choose-a-password-vault-provider\" aria-label=\"1 choose a password vault provider permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Choose a password vault provider</h3>\n<p>There are several password vault providers to choose from, both free and paid. Research and choose one that best suits your needs.</p>\n<h3 id=\"2-install-the-password-vault-application\" style=\"position:relative;\"><a href=\"#2-install-the-password-vault-application\" aria-label=\"2 install the password vault application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Install the password vault application</h3>\n<p>Once you've chosen a provider, install the password vault application on your device. Most of them can be installed on your web browser, and you can quickly access your accounts with the auto-fill credentials option. </p>\n<h3 id=\"3-create-a-master-password\" style=\"position:relative;\"><a href=\"#3-create-a-master-password\" aria-label=\"3 create a master password permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Create a master password</h3>\n<p>The master password is used to access the stored passwords, so it's essential to create a solid and unique password that's difficult to guess.</p>\n<h3 id=\"4-add-passwords\" style=\"position:relative;\"><a href=\"#4-add-passwords\" aria-label=\"4 add passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Add passwords</h3>\n<p>Add all the passwords you want to store in the password vault. Using the password generator feature is recommended to create strong, unique passwords.</p>\n<h3 id=\"5-use-the-password-vault\" style=\"position:relative;\"><a href=\"#5-use-the-password-vault\" aria-label=\"5 use the password vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Use the password vault</h3>\n<p>Once all the passwords are added, you can use the password vault to access them.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Password vaults have become a popular solution for securely storing passwords in today's digital age. They provide a high level of security for passwords, encourage good password habits, and save time for users.</p>\n<p>While they are not immune to hacking, users can minimize the risk of a breach by choosing a reputable password vault provider, creating a strong master password, and following best practices. </p>\n<p>Implementing a password vault involves choosing a provider, installing the application, creating a master password, adding passwords, and using the password vault to access them. Overall, using a password vault is wise for anyone looking to protect their sensitive information and enhance their online security.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  Is it safe to use a password vault?</strong></p>\n<p>Yes. Password vaults use robust encryption to store passwords, securely enhancing digital identity management.</p>\n<p><strong>2. What is the difference between a password manager and a vault?</strong></p>\n<p>A password manager stores and manages passwords, while a vault goes further by securely encrypting and protecting those passwords.</p>\n<p><strong>3. How do you use a password vault?</strong></p>\n<p>Simply create a master password, add your passwords to the vault, and use the master password to access them securely.</p>\n<p><strong>4.  What is a vault used for?</strong></p>\n<p>A vault stores and manages passwords, providing convenience and enhanced security for digital identity management.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-password-vault-how-does-it-work\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 19, 2023","updated_date":null,"title":"What is a Password Vault and How Does it Work?","tags":["robust security","password management","data privacy"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/ada4413898b5488023a6130f69cc1130/7f8e9/password-vault.webp","srcSet":"/static/ada4413898b5488023a6130f69cc1130/61e93/password-vault.webp 200w,\n/static/ada4413898b5488023a6130f69cc1130/1f5c5/password-vault.webp 400w,\n/static/ada4413898b5488023a6130f69cc1130/7f8e9/password-vault.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rajeev Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/cybersecurity-best-practices-for-enterprises/"},"html":"<p>In the coming years, cybercrime will continue to grow. Between 2023 and 2028, the global 'Estimated Cost of Cybercrime' indicator in the cybersecurity market was anticipated to rise consistently, reaching a total of <a href=\"https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide\">5.7 trillion U.S. dollars</a>, marking a significant increase of 69.94 percent.</p>\n<p>Businesses of all sizes will continue facing new threats on a daily basis—phishing scams and malware being the most common ones. Both can be devastating to unprotected companies. To help you avoid becoming another cybercrime statistic, we’ve created this infographic with our top cybersecurity best practices.</p>\n<p>In 2020, when a large chunk of the world population shifted to work from home models, cybercriminals also transitioned to remote operations. In fact, a report also suggested that remote working accounted for <a href=\"https://resources.malwarebytes.com/files/2020/08/Malwarebytes_EnduringFromHome_Report_FINAL.pdf\">20% of cybersecurity incidents</a> that occurred during the pandemic. </p>\n<p>2021 and 2022 were no different. Remember when Taiwanese computer giant Acer was hit by a REvil ransomware attack in March this year? The hackers demanded a <a href=\"https://constellix.com/news/acer-responds-to-being-hit-by-50m-ransomware-attack\">whopping $50 million</a>. They shared images of stolen files as proof of breaching Acer’s security and the consequent data leak.</p>\n<p>Not only was the same gang responsible for the 2020 ransomware strike on Travelex, they reportedly extorted more than $100 million in one year from large businesses.</p>\n<p>These are wake-up calls, and it is high time organizations must <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">understand cyber threats</a> and do everything possible to prevent data breaches.</p>\n<p>Here are some cybersecurity best practices this infographic will cover.</p>\n<h3 id=\"use-tougher-security-questions\" style=\"position:relative;\"><a href=\"#use-tougher-security-questions\" aria-label=\"use tougher security questions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use tougher security questions.</h3>\n<p>Security questions prevent imposters from infiltrating the verification process. So what does <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">a good security question</a> look like? </p>\n<p>The best ones will make it easy for legitimate users to authenticate themselves. They should be: </p>\n<ul>\n<li>Safe: Hackers shouldn’t be able to guess or research it.</li>\n<li>Stable: The answer shouldn’t change over time.</li>\n<li>Memorable: The user should be able to remember it.</li>\n<li>Simple: The password should be precise, easy, and consistent.</li>\n<li>Many: The password should have many possible answers.</li>\n</ul>\n<h3 id=\"enable-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#enable-multi-factor-authentication-mfa\" aria-label=\"enable multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable multi-factor authentication (MFA).</h3>\n<p>Multi-factor authentication is a powerful feature to prevent unauthorized users from accessing sensitive data. </p>\n<p>For the most secure user sign-ins, you should use a combination of elements like biometrics, SMS/text messages, emails, and security questions. Use <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">extra layers of protection</a>, like text verification, email verification, or time-based security codes.</p>\n<p>For example, you can allow an employee to log in on a managed device from your corporate network. But if a user is logging in from an unknown network on an unmanaged device, ask them to crack an additional layer of security. </p>\n<h3 id=\"create-a-strong-password-policy\" style=\"position:relative;\"><a href=\"#create-a-strong-password-policy\" aria-label=\"create a strong password policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a strong password policy.</h3>\n<p>To protect your organization's network, enforce a strong password security policy with the following practices:</p>\n<ul>\n<li><strong>Longer passwords</strong>: The minimum length should be 15 characters, more if possible.</li>\n<li><strong>Mix characters</strong>: The password should be a combination of uppercase and lowercase letters, numbers, and symbols. The more complex your password is, the harder will it be for brute force attackers. </li>\n<li><strong>Do not allow dictionary words</strong>: Do not use everyday dictionary words or even a combination of words. For example, \"chocolate\" is a bad password, so is \"dark chocolate\". Go for a passphrase instead. They are a string of related words with no sentence structure. Here is an example: hotdog food ketchup relish mustard mayo. </li>\n<li><strong>Don’t use memorable keyboard paths</strong>: Do not use sequential keyboard paths like qwerty, a1s2d3f4, or asdfgh. </li>\n<li><strong>Change passwords regularly</strong>: Change passwords at a regular interval. It can be once every month or twice a month. </li>\n<li><strong>Use a password manager</strong>: Password managers can auto-generate and store strong passwords on your behalf. They save your passwords in an encrypted, centralized location, and allow you to access them with a master password. </li>\n</ul>\n<h3 id=\"embrace-cybersecurity-training\" style=\"position:relative;\"><a href=\"#embrace-cybersecurity-training\" aria-label=\"embrace cybersecurity training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Embrace cybersecurity training.</h3>\n<p>Conduct cybersecurity awareness workshops to train your employees at regular intervals. It will help reduce cyberattacks caused by human error and employee negligence to a great extent. </p>\n<h3 id=\"create-data-backups\" style=\"position:relative;\"><a href=\"#create-data-backups\" aria-label=\"create data backups permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create data backups.</h3>\n<p>A data backup solution is one of the best measures to keep personal and business data secure from a ransomware attack. Ransomware is malicious software that is accidentally deployed by an employee by clicking on a malicious link. And deployed, all data in the site is taken hostage. </p>\n<p>You can ensure the protection of your data by implementing continuous backups. You can use the cloud to create a copy of your data on a server and hosts it in a remote location. In case, your system is hacked, you can restore back your data. </p>\n<p>Aside from login security tips, this infographic will also highlight:</p>\n<ul>\n<li>A few fascinating facts about cybercrime.</li>\n<li>The hidden costs of cybercrime.</li>\n<li>The intensity of damage predictions.  </li>\n<li>A cybercriminal’s ROI</li>\n<li>A few eye-opening statistics </li>\n</ul>\n<p>To learn more about the cybersecurity best practices for your business in 2023 and beyond, check out the infographic created by LoginRadius.</p>\n<p><img src=\"/a830327430cb6c3103cd183d50cbfde4/cybersecurity-infographic2023.webp\" alt=\"cybersecurity-infographic-2023\"></p>\n<p>Get the best cybersecurity solutions for your enterprise with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=cybersecurity-best-practices-for-enterprises\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 21, 2021","updated_date":null,"title":"Cybersecurity Best Practices for Businesses in 2023 & Beyond [Infographic]","tags":["cybersecurity","data security","cx","password management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/2054e143ee62c046f4ff0fb6b40d0f23/7f8e9/cybersecurity-best-practices.webp","srcSet":"/static/2054e143ee62c046f4ff0fb6b40d0f23/61e93/cybersecurity-best-practices.webp 200w,\n/static/2054e143ee62c046f4ff0fb6b40d0f23/1f5c5/cybersecurity-best-practices.webp 400w,\n/static/2054e143ee62c046f4ff0fb6b40d0f23/7f8e9/cybersecurity-best-practices.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/benefits-of-reauthentication/"},"html":"<p>Re-authentication is the process of ensuring the constant presence that has to be authenticated when there is a long period of usage. The purpose of re-authentication is to ensure that the person who is currently using the resources is the same person who had initially signed in to use it. This will ensure that there is no breach of identification or exploitation of data.  </p>\n<h2 id=\"benefits-of-re-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-re-authentication\" aria-label=\"benefits of re authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Re-authentication</h2>\n<p>So, what are the benefits of imposing a re-authentication time limit? Let’s find out. </p>\n<h3 id=\"1-it-offers-central-control-on-user-access\" style=\"position:relative;\"><a href=\"#1-it-offers-central-control-on-user-access\" aria-label=\"1 it offers central control on user access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. It offers central control on user access.</h3>\n<p>The re-authentication process offers enterprises or service providers complete control over who has access to a particular system or services. Some systems use control panels to ensure that all the data regarding the user is recorded and has easy access. This also plays an important role in solving any future issue regarding identity breaches.</p>\n<h3 id=\"2-it-dispels-the-concept-of-password-fatigue\" style=\"position:relative;\"><a href=\"#2-it-dispels-the-concept-of-password-fatigue\" aria-label=\"2 it dispels the concept of password fatigue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. It dispels the concept of password fatigue.</h3>\n<p>When a user requires to generate and remember more than one password, password fatigue may arise. While there are solutions like password managers that help solve the issue of remembering multiple passwords, they might not always be a safe choice. Many people still find it difficult to use and maintain a separate list of passwords on the side. There might be chances in which an intruder can gain access to such sensitive data and misuse it.</p>\n<p>Thus, a re-authentication is considered ideal for the elimination of password fatigue. The system will undertake the identity test without the need to type the password and ensure a safe environment for the users.</p>\n<p><a href=\"https://www.loginradius.com/resource/adding-salt-to-hashing-a-step-by-step-guide-to-store-passwords/\"><img src=\"/0ae1ae918cb69edc2a85ecc7574527e2/GD-salt-hashing.webp\" alt=\"GD-salt-hashing\"></a></p>\n<h3 id=\"3-it-reduces-the-need-for-it-support-calls\" style=\"position:relative;\"><a href=\"#3-it-reduces-the-need-for-it-support-calls\" aria-label=\"3 it reduces the need for it support calls permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. It reduces the need for IT support calls.</h3>\n<p>There are many instances where users forget their passwords and are locked out of their system due to multiple wrong attempts. This issue is often resolved with the aid of the IT call center. However, the process of resetting the password in high-security systems is very time-consuming and costly.</p>\n<p>The average cost for the IT department to reset a password is $70, and around 50% of the IT department focuses on resetting the password.</p>\n<p>Re-authentication ensures that there is minimal effort to be put on behalf of the IT department. It is both a cost-effective and time-saving mode of usage.</p>\n<h3 id=\"4-it-integrates-enhanced-password-policy\" style=\"position:relative;\"><a href=\"#4-it-integrates-enhanced-password-policy\" aria-label=\"4 it integrates enhanced password policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. It integrates enhanced password policy.</h3>\n<p>Re-authentication helps <a href=\"https://www.loginradius.com/blog/identity/loginradius-password-policy-business-consumer/\">implement better password policies</a> in an enterprise. This can be regarding how an employee uses the password and manages it. For instance, who can change the password, what can be the length of the password, and other similar password settings? Some of the password policies are:</p>\n<ul>\n<li>A password history policy where old passwords cannot be reused</li>\n<li>A maximum age policy for passwords. This will expire the password validity after the stipulated time.</li>\n<li>A minimum password length policy so that the password used is not too short and easy.</li>\n<li>A password audit policy to recognize the identity of who alters the password.</li>\n<li>A minimum password age policy to ensure that passwords are not constantly changed.</li>\n</ul>\n<p>Having such a tight password policy will ensure that the team has only secure and quality passwords being used in their systems.</p>\n<h3 id=\"5-it-alleviates-on-premises-security-danger\" style=\"position:relative;\"><a href=\"#5-it-alleviates-on-premises-security-danger\" aria-label=\"5 it alleviates on premises security danger permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. It alleviates on-premises security danger</h3>\n<p>Apart from forgetting passwords or misplacing them, the other major issue of saving passwords on-premises is cyber theft. There is an increasing rate of hacking in many highly secure office systems, mainly due to the easy storage of passwords. </p>\n<p>On average, there are about <a href=\"https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/?utm_source=xp&#x26;utm_medium=blog&#x26;utm_campaign=content\">1,473 reports of data breaches</a> being reported every year. It has been predicted that, with the growth of technology, the risk of hacking will only increase further in the following years.</p>\n<p>Re-authentication ensures that hackers don’t get easy access to a system’s content and leverage no other loopholes to exploit sensitive consumer credentials. Apart from internal combustion, re-authentication can also save you from external intrusion.  </p>\n<p>All-in-all, you can save a lot of time and password exploitation with re-authentication. Speaking of which, the LoginRadius Re-authentication feature can help businesses securely re-authenticate consumers without taking a toll on user experience. <a href=\"https://www.loginradius.com/contact-sales\">Contact us</a> today to find out more. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=benefits-of-reauthentication\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 16, 2021","updated_date":null,"title":"Discover the Benefits of Re-Authentication for Enhanced Security","tags":["data security","reauthentication","password management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5748031496062993,"src":"/static/c31addfd4517c2802ebde6209b69a793/58556/benefits-of-reauthentication-cover.webp","srcSet":"/static/c31addfd4517c2802ebde6209b69a793/61e93/benefits-of-reauthentication-cover.webp 200w,\n/static/c31addfd4517c2802ebde6209b69a793/1f5c5/benefits-of-reauthentication-cover.webp 400w,\n/static/c31addfd4517c2802ebde6209b69a793/58556/benefits-of-reauthentication-cover.webp 800w,\n/static/c31addfd4517c2802ebde6209b69a793/cc834/benefits-of-reauthentication-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/risk-management-essentials-enterprise/"},"html":"<p>The world is facing an uphill battle amid the global pandemic that has forced small and medium businesses to adopt diverse digital sales channels.</p>\n<p>Since these businesses collect consumer data, which is swiftly accumulating, there’s a significant concern regarding the overall security.</p>\n<p>Talking about the stats,<a href=\"https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance\"> WHO reported 450 active official email addresses and passwords</a> were leaked online along with thousands of other credentials – all linked with people working to lessen the COVID-19 impact.</p>\n<p>The more alarming thing is the fact that cybercriminals are continuously exploiting consumer data and have accelerated outbreaks by taking advantage of the chaotic time and the weaker first line of defense as businesses move to remote working ecosystems.</p>\n<p>So does it mean that businesses collecting consumer identities are now at more significant risk, especially those who have recently stepped into the digital commerce space?</p>\n<p>Yes, undoubtedly! Enterprises that are collecting, managing, and storing consumer identities in any form need to put their best foot forward in protecting sensitive consumer information, which, if not done at the earliest, may lead to undesirable consequences.</p>\n<p>Whether it’s the media industry or the education industry,<a href=\"https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/\"> every industry is at a considerable risk of a security breach.</a>  </p>\n<p>In this post, we’ve outlined the aspects that can mitigate the risk during the uncertain times of COVID-19 and can help secure your business in a post-pandemic world.</p>\n<h3 id=\"1-creating-a-strong-password-policy-to-secure-remote-operation\" style=\"position:relative;\"><a href=\"#1-creating-a-strong-password-policy-to-secure-remote-operation\" aria-label=\"1 creating a strong password policy to secure remote operation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Creating a Strong Password Policy to Secure Remote Operation</h3>\n<p>Since remote working accounted for<a href=\"https://resources.malwarebytes.com/files/2020/08/Malwarebytes_EnduringFromHome_Report_FINAL.pdf\"> 20% of cybersecurity incidents</a> during the pandemic, securing the newly-adopted remote working ecosystem should be the #1 priority of businesses.</p>\n<p>To protect your organization's network, enforce a firm password security policy with the following practices:</p>\n<ul>\n<li><strong>Long passwords</strong>: The minimum length should be 15 characters, more if possible.</li>\n<li><strong>Mix characters</strong>: The password should be a combination of uppercase and lowercase letters, numbers, and symbols. The more complex your password is, the harder it will be for brute-force attackers.</li>\n<li><strong>Do not allow dictionary words</strong>: Do not use everyday dictionary words or even a combination of words. For example, \"chocolate\" is a bad password, so is \"dark chocolate\". Go for a passphrase instead. They are a string of related words with no sentence structure. Here is an example: hotdog food ketchup relish mustard mayo.</li>\n<li><strong>Don’t use memorable keyboard paths</strong>: Do not use sequential keyboard paths like qwerty, a1s2d3f4, or asdfgh.</li>\n<li><strong>Change passwords regularly</strong>: Change passwords at a regular interval. It can be once every month or twice a month.</li>\n<li><strong>Use a password manager</strong>: Password managers can auto-generate and store strong passwords on your behalf. They save your passwords in an encrypted, centralized location and allow you to access them with a master password.</li>\n</ul>\n<h3 id=\"2-embrace-multi-factor-authentication-mfa-to-prevent-unauthorized-access\" style=\"position:relative;\"><a href=\"#2-embrace-multi-factor-authentication-mfa-to-prevent-unauthorized-access\" aria-label=\"2 embrace multi factor authentication mfa to prevent unauthorized access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Embrace Multi-Factor Authentication (MFA) to Prevent Unauthorized Access</h3>\n<p>Cybercriminals are already bypassing weak lines of defense, which means a stringent action plan must be in place to</p>\n<p>When it comes to preventing unauthorized access to resources and sensitive information within a network, MFA can be the game-changer.</p>\n<p>For the most secure user sign-ins, you should combine elements like biometrics, SMS/text messages, emails, and security questions. Use<a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\"> extra layers of protection</a>, like text verification, email verification, or time-based security codes.</p>\n<p>LoginRadius’ CIAM (consumer identity and access management) solution provides multiple layers of security to ensure consumer data and enterprise information remain highly secure.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-GD-to-MFA.webp\" alt=\"EB-GD-to-MFA\"></a></p>\n<h3 id=\"3-cyber-awareness-training-to-avoid-human-error\" style=\"position:relative;\"><a href=\"#3-cyber-awareness-training-to-avoid-human-error\" aria-label=\"3 cyber awareness training to avoid human error permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cyber Awareness Training to Avoid Human Error</h3>\n<p>Most cyber criminals try to sneak into a network by targeting employees through several attacks, including phishing, social engineering, and malware attacks.</p>\n<p>Suppose the employees of an organization aren’t aware of the latest attacks and how they can enhance their security while working. In that case, it may lead to a security breach causing millions of dollars of losses to the organization.</p>\n<p>Businesses must minimize human error as most of the attacks are successful just because of human error.</p>\n<p>Frequent cyber awareness training sessions must be organized within the enterprise to ensure that employees are aware of phishing emails and social engineering attacks and can handle these issues at their end.</p>\n<h3 id=\"4-unleash-the-potential-of-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#4-unleash-the-potential-of-risk-based-authentication-rba\" aria-label=\"4 unleash the potential of risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Unleash the Potential of Risk-Based Authentication (RBA)</h3>\n<p>Risk-based authentication is perhaps the best weapon against unauthorized access and to enhance network security.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">RBA is a mechanism</a> that automatically adds another stringent layer of authentication whenever the system detects any unusual login attempt or an attempt that seems fishy.</p>\n<p>For instance, if a user tries to log in from his/her town and in a few minutes, a similar login request is made from another country (even if the login credentials are the same), the user would need to prove identity through another authentication process. An alert regarding the same would also be sent to the admin.</p>\n<h3 id=\"5-data-encryption--the-need-of-the-hour\" style=\"position:relative;\"><a href=\"#5-data-encryption--the-need-of-the-hour\" aria-label=\"5 data encryption  the need of the hour permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Data Encryption- The Need of the Hour</h3>\n<p>To ensure data security on mobile devices and build trustworthiness, encryption must be in place. In this process, data is encoded to be inaccessible to unauthorized users and helps to protect sensitive data and private information.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">Encryption</a> can also improve the security of communication between servers and client apps.</p>\n<p>Although encryption is basic, it's an essential aspect of data security. Organizations must do all that they can to protect their customer's information online as well as their own. Hence, it's becoming more and more common for technology encryption to be activated on apps and websites.</p>\n<h2 id=\"final-words\" style=\"position:relative;\"><a href=\"#final-words\" aria-label=\"final words permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Words</h2>\n<p>With the rising number of identity thefts and security breaches amid the global pandemic, enterprises that haven’t yet deployed a consumer identity and access management solution should immediately put their best foot forward to reinforce their security mechanism.</p>\n<p><a href=\"https://www.loginradius.com/contact-sales/\">LoginRadius</a> can be the most acceptable alternative for both the enterprises and startups that are collecting customer data and need to ensure a secure ecosystem without hampering the overall user experience.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=risk-management-essentials-enterprise\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 20, 2021","updated_date":null,"title":"COVID-19 and Beyond: 5 Risk Management Essentials for Your Enterprise","tags":["risk management","cybersecurity","ciam solution","password management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/fcf2926caac8812410816eca189741aa/58556/risk-management-essentials-enterprise-cover.webp","srcSet":"/static/fcf2926caac8812410816eca189741aa/61e93/risk-management-essentials-enterprise-cover.webp 200w,\n/static/fcf2926caac8812410816eca189741aa/1f5c5/risk-management-essentials-enterprise-cover.webp 400w,\n/static/fcf2926caac8812410816eca189741aa/58556/risk-management-essentials-enterprise-cover.webp 800w,\n/static/fcf2926caac8812410816eca189741aa/99238/risk-management-essentials-enterprise-cover.webp 1200w,\n/static/fcf2926caac8812410816eca189741aa/7c22d/risk-management-essentials-enterprise-cover.webp 1600w,\n/static/fcf2926caac8812410816eca189741aa/25f09/risk-management-essentials-enterprise-cover.webp 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/password-spraying/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>While cyber breaches generally make for breaking news in the digital world, sometimes the attack tactics themselves claim much media attention for their uniqueness. From ransomware to phishing attacks, we have heard them all. </p>\n<p>But the one hacking tactic that is generating a lot of attention is password spraying, an attack in which hackers literally \"spray\" a number of passwords at many usernames to gain access to accounts. </p>\n<p>A <a href=\"https://enterprise.verizon.com/resources/reports/dbir/\">2020 Data Breach Investigations Report</a> revealed that over 80 percent of hacking-related data breaches involve stolen or lost credentials and employ brute force attacks, which makes password spraying a legitimate security concern. </p>\n<p>While such attacks cannot be prevented, they can be detected and even stopped mid-attack. In this article, we detail what is password spraying, how to not be vulnerable to password spraying, and what to do if you suspect that your organization has been affected by a password spraying attack. </p>\n<p>We've also listed how LoginRadius can help mitigate losses from password spraying using our robust CIAM platform.</p>\n<h2 id=\"what-is-password-spraying\" style=\"position:relative;\"><a href=\"#what-is-password-spraying\" aria-label=\"what is password spraying permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Password Spraying?</h2>\n<p>Password spraying is identified as a high-volume attack tactic in which hackers test multiple user accounts using many common passwords to gain access. Trying a single password against several user accounts before attempting a different password on the same account allows hackers to circumvent the usual account lockout protocols, enabling them to keep trying more and more passwords.</p>\n<p>Hackers can go after specific users and cycles using as many passwords as possible from either a dictionary or an edited list of common passwords. Password spraying is not a targeted attack, it is just one malicious actor acquiring a list of email accounts or gaining access to an active directory and attempting to sign in to all the accounts using a list of the most likely, popular, or common passwords until they get a hit.</p>\n<p>The key takeaway from password spraying is that user accounts with old or common passwords form the weak link hackers can exploit to gain access to the network. Unfortunately, password spraying attacks are frequently successful because so many account users fail to follow the best password protection practices or choose convenience over security. </p>\n<p>Here’s a password spraying example: Let's say an attacker wants to gain access to a company's email system. They have a list of email addresses for employees at the company but don't know their passwords. Instead of attempting to guess each employee's individual password, the attacker uses a common password (such as \"password123\") and tries it on each email account in the list. Then the attacker uses an automated tool to repeatedly enter the common password for each email address until they find one that works. This way, they can gain access to multiple email accounts with minimal effort. This is a password spraying example, which is often used in targeted attacks against organizations.</p>\n<p>The <a href=\"https://www.loginradius.com/blog/identity/2019/12/worst-passwords-list-2019/\">most common passwords</a> of compromised accounts in 2019 included obvious and simple number combinations, first names, and ironically, the word \"password\" itself. Any hacker armed with a large bank of common passwords can ably hack into accounts and cause devastating data breaches.</p>\n<p>If that isn't scary enough by itself, today's tech-savvy hackers have adopted more precise approaches, focusing on single sign-on (SSO) authentication and guessing credentials to gain access to multiple applications and systems. </p>\n<p>Cloud-based applications are also very susceptible to password spraying, as are any applications using federated authentication. This particular approach can enable bad actors to move laterally, taking advantage of internal network vulnerabilities to access sensitive data and critical applications.</p>\n<p>Some of the common TTP (tactics, techniques, and procedures) employed in password spraying include the following:</p>\n<ul>\n<li>Conducting online research and employing social engineering tactics to target specific organizations and user accounts.</li>\n<li>Using easily guessable, common passwords to launch password spray attack.</li>\n<li>Using compromised accounts to gain access to more email lists to go after more accounts.</li>\n<li>Expanding laterally within networks to steal valuable data.</li>\n</ul>\n<h2 id=\"how-to-prevent-password-spraying-attacks\" style=\"position:relative;\"><a href=\"#how-to-prevent-password-spraying-attacks\" aria-label=\"how to prevent password spraying attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Password Spraying Attacks?</h2>\n<p>Now that we know what password spraying is, we move on to the most crucial topic: how to avoid becoming a victim.</p>\n<p>Here we list out a few tips that can help safeguard your company against password spray password list attacks:</p>\n<h3 id=\"1-enable-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#1-enable-multi-factor-authentication-mfa\" aria-label=\"1 enable multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Enable multi-factor authentication (MFA)</h3>\n<p>One of the best ways to prevent any kind of hacking attempt is to <a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\">enable multi-factor authentication</a> across an organization. That way, users will have to provide two or more verification factors to sign in or gain access to applications and accounts, thereby reducing the risk of password spraying.</p>\n<h3 id=\"2-enforce-the-use-of-strong-passwords\" style=\"position:relative;\"><a href=\"#2-enforce-the-use-of-strong-passwords\" aria-label=\"2 enforce the use of strong passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Enforce the use of strong passwords</h3>\n<p>A strong password is the best protection against any attack. Conduct awareness programs for employees on the risks of hacking and data loss and enforce strong passwords beyond first names, obvious passwords, and easy number sequences.</p>\n<h3 id=\"3-review-passport-management-programs\" style=\"position:relative;\"><a href=\"#3-review-passport-management-programs\" aria-label=\"3 review passport management programs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Review passport management programs</h3>\n<p>Conduct regular reviews of passport management programs and software in organizations. Invest in password management software to effectively manage user accounts and add an extra layer of security.</p>\n<h3 id=\"4-create-security-awareness-at-workplaces\" style=\"position:relative;\"><a href=\"#4-create-security-awareness-at-workplaces\" aria-label=\"4 create security awareness at workplaces permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Create security awareness at workplaces</h3>\n<p>Provide security awareness training for your employees to bring them up to speed on the latest threats and the importance of protecting themselves from malicious attacks. Employ and promote best practices, so the workforce knows how to protect their personal information and company data from hackers.</p>\n<h3 id=\"5-have-procedures-in-place-for-password-resets-and-user-lockouts\" style=\"position:relative;\"><a href=\"#5-have-procedures-in-place-for-password-resets-and-user-lockouts\" aria-label=\"5 have procedures in place for password resets and user lockouts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Have procedures in place for password resets and user lockouts</h3>\n<p>Password reset requests and user lockouts are common and frequent occurrences among organizations. Ensure that your service desk has detailed procedures in place to handle password resets and lockouts effectively.</p>\n<h2 id=\"password-spraying-vs-credential-stuffing\" style=\"position:relative;\"><a href=\"#password-spraying-vs-credential-stuffing\" aria-label=\"password spraying vs credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password Spraying Vs. Credential Stuffing</h2>\n<p>While password spraying involves testing multiple passwords against a user account, credential stuffing is a type of brute force attack that depends on automated tools to test massive volumes of stolen passwords and usernames across multiple sites till an account gives in. Both methods of cyberattacks are used to steal user credentials and facilitate account takeovers.</p>\n<h2 id=\"what-to-do-if-you-suspect-your-organization-was-affected-by-a-password-spraying-attack\" style=\"position:relative;\"><a href=\"#what-to-do-if-you-suspect-your-organization-was-affected-by-a-password-spraying-attack\" aria-label=\"what to do if you suspect your organization was affected by a password spraying attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What To Do If You Suspect Your Organization Was Affected By A Password Spraying Attack?</h2>\n<p>As we mentioned earlier, password spraying attacks cannot be prevented but definitely detected and stopped before further damage can be done. If you suspect that your organization has been affected by a password spraying attack, here's what you can do for password spraying detection and prevention:</p>\n<ul>\n<li>In the absence of MFA, immediately reset passwords for privileged and administrative domain accounts.</li>\n<li>Configure your <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">security logging platform</a> to identify failed login attempts across the office's various systems and launch an immediate response and investigation into suspicious activities.</li>\n<li>Engage an Endpoint Detection and Response (EDR) technology or Deception Technology on endpoints to view the malicious activity and block hackers from moving laterally.</li>\n<li>Review incident response plans and appropriate alert members as a further precaution.</li>\n<li>Hire a security firm with digital forensic and incident response capabilities to identify compromised accounts, investigate for potential data loss, and for additional support. </li>\n</ul>\n<h2 id=\"mitigating-password-spraying-attacks-with-the-loginradius-ciam-platform\" style=\"position:relative;\"><a href=\"#mitigating-password-spraying-attacks-with-the-loginradius-ciam-platform\" aria-label=\"mitigating password spraying attacks with the loginradius ciam platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mitigating Password Spraying Attacks With the LoginRadius CIAM Platform</h2>\n<p>LoginRadius introduces seamless registration and authentication for your valued users with passwordless login. LoginRadius Identity Platform is a unique CIAM platform that is fully customizable to fit your company's needs.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><img src=\"/3b805aa6360a4f8988029e88494d1c9d/passwordless-login.webp\" alt=\"passwordless-login\"></a></p>\n<p>The Consumer Identity and Access Management (CIAM) platform has also proved valuable to the retail and e-commerce industry, offering seamless and scalable identity management solutions that identify and protect consumer data.</p>\n<p>LoginRadius offers the following security benefits for enterprises.</p>\n<p><strong>1. Password security</strong>: The platform is equipped with features like setting password validation (minimum/maximum length, at least one special character, alphanumeric, etc.), enforcing password lifetime, password history, and password visibility.</p>\n<p><strong>2. Security against brute force attack</strong>: A <a href=\"https://www.loginradius.com/blog/identity/2021/02/brute-force-lockout/\">Brute Force Attack</a> is a common practice of hackers trying various passwords until they find the right password. When it happens, you have the option to suspend your consumer's account for a set period of time, prompt the captcha option, ask security questions, or block the account entirely.</p>\n<p><strong>3. Risk-based authentication (RBA)</strong>: RBA is an authentication system in which a new layer of protection is activated if there is a minor change in consumer conduct, such as a changed IP address, suspected search history, or some other act that seems suspicious and dangerous. LoginRadius is the ideal RBA solution for enterprises of all sizes offering authentication protocols like biometrics, push notifications, OTP, and tokens.</p>\n<p><strong>4. Multi-factor Authentication (MFA)</strong>: MFA requires consumers to pass through multiple layers of authentication during login. So, even if an attacker successfully guesses a user's password, they would still need access to the second factor of authentication, such as a security token or biometric verification, to gain access to the user's account. This makes it much more difficult for an attacker to gain unauthorized access, even if they have obtained a valid password through password spraying. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>As technology advances, so must we. There's no longer any benefit to sticking to traditional methods, and as far as identity management is concerned. Going passwordless just might be what your company needs to protect itself from not just password spraying, but from a host of other equally malicious cyber-attacks.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1: How is a password spraying attack conducted?</strong></p>\n<p>Password spraying attacks involve using a common password to attempt access to multiple accounts.</p>\n<p><strong>2: Why is password spraying considered a brute force attack?</strong></p>\n<p>Password spraying is considered a brute force attack because it uses a trial-and-error method to guess passwords.</p>\n<p><strong>3: What systems do password spraying target?</strong></p>\n<p>Password spraying attacks typically target systems that allow remote access, such as email services and VPNs.</p>\n<p><strong>4: What is an IMAP-based password spraying attack?</strong></p>\n<p>An IMAP-based password spraying attack involves targeting email accounts using the IMAP protocol.</p>\n<p><strong>5: How can I detect password spraying attacks?</strong></p>\n<p>Password spraying attacks can be detected by monitoring login attempts and looking for patterns of failed login attempts from a single IP address.</p>\n<p><strong>6: Is it possible to prevent a password spraying attack?</strong></p>\n<p>Preventing password spraying attacks can be done by implementing multi-factor authentication, strong password policies, and monitoring for suspicious activity on the network.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=password-spraying\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 07, 2021","updated_date":null,"title":"Password Spraying: What Is It And How To Prevent It?","tags":["data security","mfa","password management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/e860a722cf6ce888c38f6085226f8048/7f8e9/password-spraying.webp","srcSet":"/static/e860a722cf6ce888c38f6085226f8048/61e93/password-spraying.webp 200w,\n/static/e860a722cf6ce888c38f6085226f8048/1f5c5/password-spraying.webp 400w,\n/static/e860a722cf6ce888c38f6085226f8048/7f8e9/password-spraying.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/loginradius-password-policy-business-consumer/"},"html":"<p>A password policy is a set of rules that businesses design to enhance their applications and data security. It typically includes encouraging or requiring users to create strong, and safer passwords to maintain a baseline shield against hackers. </p>\n<p>A strong password policy outlines how passwords should be created, stored and how often they should be updated. Many default password policies, for instance, require a minimum of eight characters in length and some combination of special characters.</p>\n<p>LoginRadius Password Policy offers the first line of defense in protecting business and consumer data. From setting complexity requirements to preventing users from choosing previously used passwords, the recently launched feature provides a plethora of robust password management opportunities. </p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>Using the Password Policy feature by LoginRadius, businesses can collectively make their application and consumer accounts more secure by combating password-related attacks and frauds. Some of the major benefits include:</p>\n<ul>\n<li>Businesses can ensure that consumers' actual password value is never stored in their database with password hashing and salting,</li>\n<li>Businesses can implement common password prevention policies to protect against dictionary attacks.</li>\n<li>Businesses can introduce complexity to passwords like the use of mandatory alphanumeric and special characters, and a minimum password length policy. </li>\n<li>Businesses can restrict consumers from using their email, name, DOB, etc., in account passwords. </li>\n<li>Businesses can enforce auto-expiry of passwords and then restrict consumers from reusing a previous password.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/password-policy-datasheet\"><img src=\"/df9bd40a5086f3551409c903566f3c1d/password-policy-datasheet.webp\" alt=\"password-policy-datasheet\"></a></p>\n<h2 id=\"key-features-offered-by-loginradius\" style=\"position:relative;\"><a href=\"#key-features-offered-by-loginradius\" aria-label=\"key features offered by loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features Offered by LoginRadius</h2>\n<ul>\n<li>\n<p><strong>Password Hashing</strong>: One-way hashing ensures maximum security and compliance by restricting anyone who has access to data from viewing the password. Moreover, the stored information can only be matched and cannot be decrypted. </p>\n<p>LoginRadius supports the following one-way hashing algorithms:</p>\n</li>\n<li>PBKDF2</li>\n<li>SHA-512</li>\n<li>HMAC_SHA-256 </li>\n<li>HMAC<em>SHA256</em>BitEncrypted</li>\n<li>\n<p>SHA1PasswordPBKDF2</p>\n<p>Businesses can update the applied password hashing algorithm anytime without requiring a password reset. Similarly, LoginRadius also supports migration from weak to the above mentioned strong hashing algorithms.</p>\n</li>\n<li><strong>Password Salting</strong>: This feature adds a layer of security to the hashing process, specifically against brute force attacks. LoginRadius supports two ways of Password Salting.</li>\n<li>Peppered: A system-wide salt to prefix or suffix across all passwords.</li>\n<li>Bring Your Own Key (BYOK): A unique salt to use per password, making it more secure than peppered.</li>\n<li><strong>Password Compliance Check</strong>: Businesses can identify if consumers are complying with their configured password complexity. They can also generate reports for those who do not follow the new set rules and take action accordingly to ensure security and compliance.</li>\n<li><strong>Data Encryption</strong>: LoginRadius offers encryption at-rest and in-transit. It allows communication with the TLS1.2 protocol and all lower versions of the SSL protocols are disabled.</li>\n</ul>\n<p>The Password Policy feature also offers the following consumer-centric features:</p>\n<ul>\n<li><strong>Password Complexity</strong>: Businesses can make sure consumers follow the complexity rules while creating or updating their account password. For example, they can set a minimum or maximum password length with a mandatory alphanumeric and special character (s). </li>\n<li><strong>Common Password Protection</strong>: Businesses can restrict consumers from setting a common password for their accounts. </li>\n<li><strong>Profile Password Prevention</strong>: Businesses can restrict consumers from using the profile data as a password for their account.</li>\n<li><strong>Password Expiration</strong>: Businesses can set an auto-expiry age to force consumers to change their passwords in a configured duration.</li>\n<li><strong>Password History</strong>: Businesses can configure how many unique passwords a consumer must set for their account before reusing an old password. For example, they can restrict consumers from using their three recent account passwords.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>We can’t emphasize enough the importance of using a strong password. Implementing our comprehensive Password Policy can secure both your organization's and consumers' assets. With LoginRadius, you will always be a step ahead and mitigate the risks associated with passwords.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-password-policy-business-consumer\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 11, 2021","updated_date":null,"title":"Announcement - LoginRadius Introduces Password Policy to Ensure Best Practices for Businesses and Consumers","tags":["password management","data security","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/a8d0bb75c5fa0ac4687aa34dcf1b7412/c0524/loginradius-password-policy.webp","srcSet":"/static/a8d0bb75c5fa0ac4687aa34dcf1b7412/61e93/loginradius-password-policy.webp 200w,\n/static/a8d0bb75c5fa0ac4687aa34dcf1b7412/1f5c5/loginradius-password-policy.webp 400w,\n/static/a8d0bb75c5fa0ac4687aa34dcf1b7412/c0524/loginradius-password-policy.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/how-to-choose-a-secure-password/"},"html":"<p>No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password. </p>\n<p>Passwords are the digital keys to our daily lives. They are the gateway to our professional services, our network of friends, and all our financial applications. </p>\n<p>No wonder we want to keep our passwords private and secure! </p>\n<p>If someone gains access to your email ID, they can easily opt for the \"forgot your password?\" link on (for example, an online shopping or banking site) you use. </p>\n<p>Also, if a cybercriminal successfully hacks into your social media account, they can post fraudulent messages asking for money or sending out links to scammer websites. </p>\n<p>So, what's the solution? A good password. </p>\n<p>But before finding how to choose a strong password in 2021, let's first look at the most common methods of how passwords are being hacked today.    </p>\n<h2 id=\"how-does-a-password-get-hacked-top-5-threats\" style=\"position:relative;\"><a href=\"#how-does-a-password-get-hacked-top-5-threats\" aria-label=\"how does a password get hacked top 5 threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does a Password Get Hacked? Top 5 Threats</h2>\n<p>Hackers utilize numerous techniques to crack your passwords. One technique is to gain access by guessing the password directly. </p>\n<p>They could do it by closely following your social media presence, security questions, and similar details. This is why industry experts do not favor the use of personal details on passwords. </p>\n<p>Other tactics that hackers use include: </p>\n<h3 id=\"1-phishing-attacks\" style=\"position:relative;\"><a href=\"#1-phishing-attacks\" aria-label=\"1 phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Phishing attacks</h3>\n<p>Phishing is a <a href=\"https://www.loginradius.com/blog/identity/2020/10/social-engineering-attacks/\">social engineering attack</a> that occurs when the hacker dupes a victim into opening an email using fraudulent ads or scareware tactics. </p>\n<p>Unfortunately, such attacks are no longer just an email problem. It has somewhat expanded to instant/ text messages, social networks, videoconferencing, and gaming applications. </p>\n<p>As phishing threats grew to over 50,000 a day around December 2020, <a href=\"https://www.slashnext.com/blog/zero-hour-phishing-attack-on-googles-app-engine-targeting-office-365-users-pushes-holiday-spike-above-100/\">SlashNext Threat Labs reported</a> a 30% increase throughout 2019. </p>\n<p>Both organizations and individuals should know how to choose a strong password and take a zero-trust approach beyond domain credibility. </p>\n<h3 id=\"2-dictionary-attack\" style=\"position:relative;\"><a href=\"#2-dictionary-attack\" aria-label=\"2 dictionary attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Dictionary attack</h3>\n<p>A dictionary attack is a method of attacking the victim's account by entering every word in a dictionary as a password. They usually run through a list of common words and phrases or easy to guess passwords. </p>\n<p>Users frequently reuse their passwords or do not change them even after a breaching attempt. That makes this form of attack easy to execute. </p>\n<p>In fact, the <a href=\"https://enterprise.verizon.com/resources/reports/dbir/2019/results-and-analysis/\">2019 Verizon Data Breach Investigations Report</a> (DBIR) reveals that compromised and reused passwords are involved in 80 percent of hacking-related breaches.</p>\n<h3 id=\"3-brute-force-attacks\" style=\"position:relative;\"><a href=\"#3-brute-force-attacks\" aria-label=\"3 brute force attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Brute force attacks</h3>\n<p>Similar to a dictionary attack, brute force uses trial-and-error to guess the victim's login credentials, find a hidden web page, or access network resources. </p>\n<p>Later, those tainted accounts are used to send phishing emails, sell credentials to third parties, or spread fake content. </p>\n<p><a href=\"https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/\">Verizon's Data Breach Investigations Report 2020</a> reveals that around 20% of breaches happening within SMBs involve brute force. The number is approximately 10% for large enterprises. </p>\n<p>The trend essentially remained unchanged in 2018 and 2019, but the coronavirus pandemic may have impacted the number last year.</p>\n<h3 id=\"4-keystroke-logging\" style=\"position:relative;\"><a href=\"#4-keystroke-logging\" aria-label=\"4 keystroke logging permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Keystroke logging</h3>\n<p>Keystroke logging or keyboard capturing is the method of tracking and recording the keystrokes of the victim, thereby capturing any information typed during the session. </p>\n<p>The hacker uses tools to record the data captured by each keystroke, which are retrieved later on. Moreso, a majority of these tools can record calls, GPS data, copy-cut-paste clipboard, and microphone or camera footage. The recorded data are later used for phishing attacks, stalking, and identity theft. </p>\n<h3 id=\"5-man-in-the-middle-attacks\" style=\"position:relative;\"><a href=\"#5-man-in-the-middle-attacks\" aria-label=\"5 man in the middle attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Man-in-the-middle attacks</h3>\n<p>In this attack, the hacker positions themselves in the middle of a conversation between a user and an application to eavesdrop or impersonate a website or application. </p>\n<p>In return, the hacker <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">steals the victim's login credentials</a>, account numbers, social security numbers, etc. </p>\n<p>SaaS businesses, e-commerce sites, and users of financial services majorly fall victim to man-in-the-middle attacks.  </p>\n<h2 id=\"the-dos-and-dont-on-how-to-choose-a-strong-password\" style=\"position:relative;\"><a href=\"#the-dos-and-dont-on-how-to-choose-a-strong-password\" aria-label=\"the dos and dont on how to choose a strong password permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's and Don't on How to Choose a Strong Password</h2>\n<p><img src=\"/4a2acc02f071d012bde568e04c19d226/do&#x27;s-and-don&#x27;t-to-choose-a-strong-password.webp\" alt=\"do&#x27;s-and-don&#x27;t-to-choose-a-strong-password\"></p>\n<p>What does a secure password look like? It is usually the one that cannot be guessed easily or cracked using software tools. </p>\n<p>Not that it should only be unique and complex, here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of the attacks mentioned above.</p>\n<h3 id=\"the-dos\" style=\"position:relative;\"><a href=\"#the-dos\" aria-label=\"the dos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's</h3>\n<p><strong>Use two-factor authentication (2FA)</strong>: <a href=\"https://www.loginradius.com/multi-factor-authentication/\">2FA</a> adds an additional layer of security to your existing account. Even if the hacker is able to crack your password, they will still have an extra layer to authenticate. </p>\n<p>The following are a few types of layers that businesses choose to provide:</p>\n<ul>\n<li>A PIN or password.</li>\n<li>A physical asset such as the last 4 digits of your credit card.</li>\n<li>An OTP sent to your mobile device.</li>\n<li>A biometric authenticator such as a fingerprint or voiceprint. </li>\n</ul>\n<p><strong>Follow standard password rules</strong>: There are a few basic rules on how to choose a strong password that you should closely follow.</p>\n<ul>\n<li>Short passwords are very easy to crack. Use a minimum of 10 characters.</li>\n<li>Include a mixture of numbers, capital letters, lower-case letters, and symbols to make the password difficult to crack. </li>\n</ul>\n<p><strong>Choose sufficiently random combinations of words</strong>: Yes, it is possible to use an easy-to-remember password and make it secure at the same time. The following are a few ways to do that:</p>\n<ul>\n<li>Pick a sentence that you probably won't forget, like \"When I was fifteen, I had my first international trip.\" Then use the first letters, add the numbers, and punctuation to make \"wIw15,ihmfit.\"</li>\n<li>Pick any three random words like Jack Book Pen. Choose your birth date, put the words together, and split up the date like 1jackbookpen4. Next, capitalize each letter and add a few special characters like 1J@ckBookPen4!</li>\n</ul>\n<p><strong>Pick something that does not make sense</strong>: How to choose a <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">strong password</a>? Go for something that has no meaning. For example, it could be:</p>\n<ul>\n<li>A familiar word using odd characters like phnybon instead of funnybone.</li>\n<li>A deliberately misspelled term like Win-G8 (Wooden Gate)</li>\n<li>Replace letters with the least expected symbols. Like for \"O\" use \"()\" instead of \"0\".</li>\n<li>Use phonetically pronounceable words that make no sense, like good-eits.</li>\n</ul>\n<p><strong>Change your passwords regularly</strong>: Also, do not reuse the same password for a long time. The more sensitive your data is, the more frequently you should change your password.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-buyers-GD-to-MFA.webp\" alt=\"EB-buyers-GD-to-MFA\"></a></p>\n<p><strong>Always remember to log out</strong> of websites and devices once you are done using them. </p>\n<h3 id=\"the-donts\" style=\"position:relative;\"><a href=\"#the-donts\" aria-label=\"the donts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Don’ts</h3>\n<ul>\n<li>Do not use your name in your passwords in any form - first, last, spelled backward, or nicknames.</li>\n<li>Do not use passwords that are fewer than eight characters.</li>\n<li>Do not use the name of your pets, friends, or close relatives.</li>\n<li>Do not use special dates like your birthdays and anniversaries. </li>\n<li>Do not use your phone number or office number.</li>\n<li>Do not use your user ID, even when spelled backward.</li>\n<li>Do not use acronyms, technical terms, or names of places.</li>\n<li>Do not use names from popular culture like Harry_Potter, Hogwarts. </li>\n<li>Do not use all numeric passwords like your license plate numbers.</li>\n<li>Do not use dictionary words. </li>\n<li>Do not use commonly used passwords like 123456, qwerty, 11111111, asdfgh.</li>\n<li>Do not write down your passwords or share them with anyone else.</li>\n<li>Do not save your passwords in unfamiliar computers or browsers.</li>\n<li>Do not use the secret question option. It does not make any sense to use a strong password and back it up with an easily guessable security question.</li>\n<li>Do not use obvious substitutions like \"H0me\" for \"Home\" or \"D00R8377\" for \"DOORBELL.\"</li>\n</ul>\n<h2 id=\"the-20-worst-passwords-of-2020\" style=\"position:relative;\"><a href=\"#the-20-worst-passwords-of-2020\" aria-label=\"the 20 worst passwords of 2020 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The 20 Worst Passwords of 2020</h2>\n<p><a href=\"https://nordpass.com/most-common-passwords-list/\">According to Nordpass.com</a>, here are the 20 worst passwords of 2020. The list also offers an overview of how many times the password has been breached, among other parameters. </p>\n<p>Disclaimer: Stay away from these passwords. </p>\n<table>\n  <tr>\n   <td><strong>Position </strong>\n   </td>\n   <td><strong>Password </strong>\n   </td>\n   <td><strong>Number of users</strong>\n   </td>\n   <td><strong>Time to crack it</strong>\n   </td>\n   <td><strong>Times exposed</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>1\n   </td>\n   <td>123456\n   </td>\n   <td>2,543,285\n   </td>\n   <td>Less than a second\n   </td>\n   <td>23,597,311\n   </td>\n  </tr>\n  <tr>\n   <td>2\n   </td>\n   <td>123456789\n   </td>\n   <td>961,435\n   </td>\n   <td>Less than a second\n   </td>\n   <td>7,870,694\n   </td>\n  </tr>\n  <tr>\n   <td>3\n   </td>\n   <td>picture1\n   </td>\n   <td>371,612\n   </td>\n   <td>Three hours\n   </td>\n   <td>11,190\n   </td>\n  </tr>\n  <tr>\n   <td>4\n   </td>\n   <td>password\n   </td>\n   <td>360,467\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,759,315\n   </td>\n  </tr>\n  <tr>\n   <td>5\n   </td>\n   <td>12345678\n   </td>\n   <td>322,187\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,944,615\n   </td>\n  </tr>\n  <tr>\n   <td>6\n   </td>\n   <td>111111\n   </td>\n   <td>230,507\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,124,368\n   </td>\n  </tr>\n  <tr>\n   <td>7\n   </td>\n   <td>123123\n   </td>\n   <td>189,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,238,694\n   </td>\n  </tr>\n  <tr>\n   <td>8\n   </td>\n   <td>12345\n   </td>\n   <td>188,268\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,389,787\n   </td>\n  </tr>\n  <tr>\n   <td>9\n   </td>\n   <td>1234567890\n   </td>\n   <td>171,724\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,264,884\n   </td>\n  </tr>\n  <tr>\n   <td>10\n   </td>\n   <td>senha\n   </td>\n   <td>167,728\n   </td>\n   <td>Ten seconds\n   </td>\n   <td>8,213\n   </td>\n  </tr>\n  <tr>\n   <td>11\n   </td>\n   <td>1234567\n   </td>\n   <td>165,909\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,516,606\n   </td>\n  </tr>\n  <tr>\n   <td>12\n   </td>\n   <td>qwerty\n   </td>\n   <td>156,765\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,946,737\n   </td>\n  </tr>\n  <tr>\n   <td>13\n   </td>\n   <td>abc123\n   </td>\n   <td>151,804\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,877,689\n   </td>\n  </tr>\n  <tr>\n   <td>14\n   </td>\n   <td>Million2\n   </td>\n   <td>143,664\n   </td>\n   <td>Three hours\n   </td>\n   <td>162,609\n   </td>\n  </tr>\n  <tr>\n   <td>15\n   </td>\n   <td>000000\n   </td>\n   <td>122,982\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,959,780\n   </td>\n  </tr>\n  <tr>\n   <td>16\n   </td>\n   <td>1234\n   </td>\n   <td>112,297\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,296,186\n   </td>\n  </tr>\n  <tr>\n   <td>17\n   </td>\n   <td>iloveyou\n   </td>\n   <td>106,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,645,337\n   </td>\n  </tr>\n  <tr>\n   <td>18\n   </td>\n   <td>aaron431\n   </td>\n   <td>90,256\n   </td>\n   <td>Three hours\n   </td>\n   <td>30,576\n   </td>\n  </tr>\n  <tr>\n   <td>19\n   </td>\n   <td>password1\n   </td>\n   <td>87,556\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,418,984\n   </td>\n  </tr>\n  <tr>\n   <td>20\n   </td>\n   <td>qqww1122\n   </td>\n   <td>85,476\n   </td>\n   <td>Fifty two minutes\n   </td>\n   <td>122,481\n   </td>\n  </tr>\n</table>\n<h2 id=\"5-tips-on-how-to-choose-a-strong-password-manager\" style=\"position:relative;\"><a href=\"#5-tips-on-how-to-choose-a-strong-password-manager\" aria-label=\"5 tips on how to choose a strong password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Tips on How to Choose a Strong Password Manager</h2>\n<p><img src=\"/8515c3127c9803c5124d8125057cecf7/how-to-choose-a-strong-password.webp\" alt=\"how-to-choose-a-strong-password\"></p>\n<p>A password manager helps you auto-generate strong passwords and stores them in encrypted, centralized locations on your behalf. You can access all your passwords with a master password. </p>\n<p>A lot of password managers are free to use and provide optional features such as synchronizing new passwords across several devices. If allowed, they also audit users’ actions to ensure that they are not repeating their passwords in multiple locations. </p>\n<p>So, (to be on the right track), how to choose a strong password manager? Well, it should at least have the following core features:</p>\n<ul>\n<li><strong>Storage</strong>: While some password managers store passwords in a local hard-drive, some others use cloud storage. The latter is usually preferable if your employees or users use multiple devices. They can access their account credentials from any device with an internet connection. Also, if their devices are stolen, they won't lose their passwords. </li>\n<li><strong>Encryption</strong>: Go for a strong <a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">encryption standard</a>. The next time you wonder how to choose a strong password manager, go for the one that uses 256-bit Advanced Encryption Standard (AES) encryption.  </li>\n<li><strong>Easy-to-use</strong>: The password manager you choose should have an intuitive interface so that it's easy to use. Otherwise, your users or employees will stick to their old habits of creating weak, familiar passwords. Some managers also offer automated password changers that automatically change old passwords to new stronger ones.</li>\n<li><strong>Security</strong>: It should support two-factor authentication, track password usage, and generate audit reports. The password manager should also end sessions when a device is idle for a predefined amount of time. Also, ensure it has a built-in VPN and the ability to restrict access to blacklisted Internet sites. </li>\n<li>\n<p><strong>Value</strong>: The password manager should also have additional nice-to-have features:</p>\n<ul>\n<li>Automated support for directory services integration.</li>\n<li>The ability to generate a portable vault.</li>\n<li>An account recovery feature in case of forgotten master passwords.</li>\n<li>The ability to encrypt and store sensitive files in secure vaults. </li>\n</ul>\n</li>\n</ul>\n<h2 id=\"reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" style=\"position:relative;\"><a href=\"#reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" aria-label=\"reduce password vulnerabilities using the loginradius password management solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduce Password Vulnerabilities Using the LoginRadius Password Management Solution</h2>\n<p>To answer the popular question \"how to choose a strong password in 2021\", LoginRadius offers a range of robust Password Policy features. </p>\n<p><a href=\"https://www.loginradius.com/\">The CIAM platform</a> captures the following categories of password management in the LoginRadius Admin Console:</p>\n<ul>\n<li><strong>Password Expiration</strong>: You can customize how often you want your consumers to reset their passwords. There's a password expiry configuration setting to help you out.</li>\n<li><strong>Password History</strong>: You can configure the number of unique passwords a consumer must set before allowing them to reuse one of their older passwords. </li>\n<li><strong>Password Complexity</strong>: You can configure the password complexity for your consumer's account by forcing validation rules, preventing them from using common passwords and dictionary words.</li>\n<li><strong>Password Compliance Check</strong>: You can identify which consumers are abiding by your password complexity requirements and flag those who aren't. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>By now, you know how to choose a strong password. However, hackers will still try to crack your passwords, no matter how secure you are trying to make them. </p>\n<p>Follow the steps listed above to make your passwords as strong and unique as possible. Remember, if your password is too easy to remember, it is probably not secure at all.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-to-choose-a-secure-password\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 06, 2021","updated_date":null,"title":"The Do's and Don'ts of Choosing a Secure Password","tags":["data security","password management","ciam solution","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3986013986013985,"src":"/static/5f6051708c66e72baac79bef4567e9b4/176df/how-to-choose-a-secure-password-in-2021.webp","srcSet":"/static/5f6051708c66e72baac79bef4567e9b4/61e93/how-to-choose-a-secure-password-in-2021.webp 200w,\n/static/5f6051708c66e72baac79bef4567e9b4/1f5c5/how-to-choose-a-secure-password-in-2021.webp 400w,\n/static/5f6051708c66e72baac79bef4567e9b4/176df/how-to-choose-a-secure-password-in-2021.webp 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/loginradius-announces-user-management/"},"html":"<p>Determining how consumers are introduced to a brand is as important as managing their subsequent journey. With LoginRadius’ recently <a href=\"https://www.loginradius.com/user-management/\">launched User Management feature</a>, businesses can enjoy streamlined access control and adjustable privileges for their consumers. </p>\n<h2 id=\"intent-behind-the-launch\" style=\"position:relative;\"><a href=\"#intent-behind-the-launch\" aria-label=\"intent behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intent Behind the Launch</h2>\n<p>Simply put, the LoginRadius User Management feature solves the problem of managing the multiple operations that revolve around consumer data. </p>\n<p>It also has been designed to help your business in the following ways: </p>\n<ul>\n<li>It is an easy-to-use feature launched to handle your user management and support requirements.</li>\n<li>It allows you to control and restrict access for consumers from the LoginRadius Admin Console. You can also handle consumers from your application’s admin console.</li>\n<li>It allows you to block, or delete consumers based on your business policies. </li>\n<li>It allows you to feed consumers' data in real-time using Webhooks and APIs.</li>\n<li>It reduces your team effort to maintain and manage consumer data.</li>\n<li>It helps you to migrate the existing consumer data from multiple sources.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-user-management/\"><img src=\"/19a7a4a6794267ecd76445242f5a3f6e/DS-LoginRadius-User-Management.webp\" alt=\"loginradius user management datasheet\"></a></p>\n<h2 id=\"key-capabilities-of-loginradius-user-management\" style=\"position:relative;\"><a href=\"#key-capabilities-of-loginradius-user-management\" aria-label=\"key capabilities of loginradius user management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Capabilities of LoginRadius User Management</h2>\n<p>1. <strong>User management process</strong>: LoginRadius offers complete consumer management features, including: </p>\n<ul>\n<li><strong>Provisioning</strong>: To create consumer accounts.</li>\n<li><strong>Authorization</strong>: To validate the access rights of consumers.</li>\n<li><strong>Account Management</strong>: To disable consumer accounts, and grant, or restrict access.</li>\n<li><strong>Password Management</strong>: To trigger the password reset option for consumer accounts.</li>\n<li><strong>Deprovisioning</strong>: To block, or delete consumer accounts.</li>\n</ul>\n<p>2. <strong>Multiple operations of user data</strong>: LoginRadius allows the following actions to be performed on consumers’ data:</p>\n<ul>\n<li><strong>Data filtration</strong>: To search consumers based on parameters like Name, Email, UID, ID, and Phone ID via the LoginRadius Admin Console.</li>\n<li><strong>API support for user management</strong>: To allow all user management features to be directly integrated into your application’s Admin Console.</li>\n<li><strong>Real-time user data feeds using webhooks</strong>: To obtain real-time feeds of consumer data using the LoginRadius webhooks.</li>\n<li><strong>Data migration services for user management</strong>: To offer self-serve and CSV-based data migration via the LoginRadius Admin Console.</li>\n</ul>\n<h3 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h3>\n<p>The User Management feature by LoginRadius is unique in that it monitors and manages the entire consumer journey through automated access permissions, data migration, API support, and other consumer-centric solutions. Now, blend it with creating <a href=\"https://www.loginradius.com/customer-experience-solutions/\">meaningful relationships with your consumers</a>—that’s what we offer. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-announces-user-management\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"Book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 30, 2020","updated_date":null,"title":"Announcement – LoginRadius Announces the Availability of User Management","tags":["user management","identity management","password management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/22595533068957863c04b02f3ec0541a/7f8e9/image1.webp","srcSet":"/static/22595533068957863c04b02f3ec0541a/61e93/image1.webp 200w,\n/static/22595533068957863c04b02f3ec0541a/1f5c5/image1.webp 400w,\n/static/22595533068957863c04b02f3ec0541a/7f8e9/image1.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Kundan Singh","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/worst-passwords-list-2019/"},"html":"<p>These days, businesses have an understanding of security hygiene and the risks of using insecure passwords. </p>\n<p>Yet, the <em>password management struggle is real</em> and it is hitting businesses <em>hard</em>. </p>\n<p>Given the fact that stolen or reused passwords are responsible for 80% of <a href=\"https://www.helpnetsecurity.com/2019/10/10/poor-password-hygiene/\">hacking-related breaches</a>, it’s high time for businesses to fix their overall security posture and step up their cybersecurity game. </p>\n<p>While more and more businesses are taking this concern seriously and are implementing security measures like password management, <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a> (MFA), and <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, it is unfortunate that people still cling to poor password habits. </p>\n<p>NordPass came up with a database of 500 million leaked passwords and ranked them based on their usage in its list of worst passwords in 2019. Keep reading for some of the worst of the bunch. </p>\n<h2 id=\"the-top-51-worst-passwords-of-2019\" style=\"position:relative;\"><a href=\"#the-top-51-worst-passwords-of-2019\" aria-label=\"the top 51 worst passwords of 2019 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Top 51 Worst Passwords of 2019</h2>\n<p>In this list, you’ll recognize some old standbys like \"123456\" and \"password\" in the top spots. But there are some unexpected ones here, too. </p>\n<p>For example, passwords like zinch and g_czechout may seem harder to crack, yet they still made it to the 7th and 8th positions, respectively.</p>\n<p>You’ll also see popular female names like Jasmine or Jennifer. Another tactic is using a string of letters that forms a pattern or a line on the keyboard. Popular examples include asdfghjkl and 1qaz2wsx. </p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><img src=\"/0211bcf38d1a0a60f9930324cfba56e0/credential-stuffing.webp\"></a></p>\n<p>Here they all are in top ranking order.  </p>\n<table>\n<thead>\n<tr>\n<th><strong>Rank</strong></th>\n<th><strong>Password</strong></th>\n<th><strong>Count</strong></th>\n<th></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>1</td>\n<td>12345</td>\n<td>2812220</td>\n<td></td>\n</tr>\n<tr>\n<td>2</td>\n<td>123456</td>\n<td>2485216</td>\n<td></td>\n</tr>\n<tr>\n<td>3</td>\n<td>123456789</td>\n<td>1052268</td>\n<td></td>\n</tr>\n<tr>\n<td>4</td>\n<td>test1</td>\n<td>993756</td>\n<td></td>\n</tr>\n<tr>\n<td>5</td>\n<td>password</td>\n<td>830846</td>\n<td></td>\n</tr>\n<tr>\n<td>6</td>\n<td>12345678</td>\n<td>512560</td>\n<td></td>\n</tr>\n<tr>\n<td>7</td>\n<td>zinch</td>\n<td>483443</td>\n<td></td>\n</tr>\n<tr>\n<td>8</td>\n<td>g_czechout</td>\n<td>372278</td>\n<td></td>\n</tr>\n<tr>\n<td>9</td>\n<td>asdf</td>\n<td>359520</td>\n<td></td>\n</tr>\n<tr>\n<td>10</td>\n<td>qwerty</td>\n<td>348762</td>\n<td></td>\n</tr>\n<tr>\n<td>11</td>\n<td>1234567890</td>\n<td>329341</td>\n<td></td>\n</tr>\n<tr>\n<td>12</td>\n<td>1234567</td>\n<td>261610</td>\n<td></td>\n</tr>\n<tr>\n<td>13</td>\n<td>Aa123456.</td>\n<td>212903</td>\n<td></td>\n</tr>\n<tr>\n<td>14</td>\n<td>iloveyou</td>\n<td>171657</td>\n<td></td>\n</tr>\n<tr>\n<td>15</td>\n<td>1234</td>\n<td>169683</td>\n<td></td>\n</tr>\n<tr>\n<td>16</td>\n<td>abc123</td>\n<td>150977</td>\n<td></td>\n</tr>\n<tr>\n<td>17</td>\n<td>111111</td>\n<td>148079</td>\n<td></td>\n</tr>\n<tr>\n<td>18</td>\n<td>123123</td>\n<td>145365</td>\n<td></td>\n</tr>\n<tr>\n<td>19</td>\n<td>dubsmash</td>\n<td>144104</td>\n<td></td>\n</tr>\n<tr>\n<td>20</td>\n<td>test</td>\n<td>139624</td>\n<td></td>\n</tr>\n<tr>\n<td>21</td>\n<td>princess</td>\n<td>122658</td>\n<td></td>\n</tr>\n<tr>\n<td>22</td>\n<td>122658</td>\n<td>116273</td>\n<td></td>\n</tr>\n<tr>\n<td>23</td>\n<td>sunshine</td>\n<td>107202</td>\n<td></td>\n</tr>\n<tr>\n<td>24</td>\n<td>BvtTest123</td>\n<td>106991</td>\n<td></td>\n</tr>\n<tr>\n<td>25</td>\n<td>11111</td>\n<td>104395</td>\n<td></td>\n</tr>\n<tr>\n<td>26</td>\n<td>ashley</td>\n<td>94557</td>\n<td></td>\n</tr>\n<tr>\n<td>27</td>\n<td>00000</td>\n<td>92927</td>\n<td></td>\n</tr>\n<tr>\n<td>28</td>\n<td>000000</td>\n<td>92330</td>\n<td></td>\n</tr>\n<tr>\n<td>29</td>\n<td>password1</td>\n<td>92009</td>\n<td></td>\n</tr>\n<tr>\n<td>30</td>\n<td>monkey</td>\n<td>86404</td>\n<td></td>\n</tr>\n<tr>\n<td>31</td>\n<td>livetest</td>\n<td>83677</td>\n<td></td>\n</tr>\n<tr>\n<td>32</td>\n<td>55555</td>\n<td>83004</td>\n<td></td>\n</tr>\n<tr>\n<td>33</td>\n<td>soccer</td>\n<td>80159</td>\n<td></td>\n</tr>\n<tr>\n<td>34</td>\n<td>charlie</td>\n<td>78914</td>\n<td></td>\n</tr>\n<tr>\n<td>35</td>\n<td>asdfghjkl</td>\n<td>77360</td>\n<td></td>\n</tr>\n<tr>\n<td>36</td>\n<td>654321</td>\n<td>76498</td>\n<td></td>\n</tr>\n<tr>\n<td>37</td>\n<td>family</td>\n<td>76007</td>\n<td></td>\n</tr>\n<tr>\n<td>38</td>\n<td>michael</td>\n<td>71035</td>\n<td></td>\n</tr>\n<tr>\n<td>39</td>\n<td>123321</td>\n<td>69727</td>\n<td></td>\n</tr>\n<tr>\n<td>40</td>\n<td>football</td>\n<td>68495</td>\n<td></td>\n</tr>\n<tr>\n<td>41</td>\n<td>baseball</td>\n<td>67981</td>\n<td></td>\n</tr>\n<tr>\n<td>42</td>\n<td>q1w2e3r4t5y6</td>\n<td>66586</td>\n<td></td>\n</tr>\n<tr>\n<td>43</td>\n<td>nicole</td>\n<td>64992</td>\n<td></td>\n</tr>\n<tr>\n<td>44</td>\n<td>jessica</td>\n<td>63498</td>\n<td></td>\n</tr>\n<tr>\n<td>45</td>\n<td>purple</td>\n<td>62709</td>\n<td></td>\n</tr>\n<tr>\n<td>46</td>\n<td>shadow</td>\n<td>62592</td>\n<td></td>\n</tr>\n<tr>\n<td>47</td>\n<td>hannah</td>\n<td>62394</td>\n<td></td>\n</tr>\n<tr>\n<td>48</td>\n<td>chocolate</td>\n<td>62325</td>\n<td></td>\n</tr>\n<tr>\n<td>49</td>\n<td>michelle</td>\n<td>61873</td>\n<td></td>\n</tr>\n<tr>\n<td>50</td>\n<td>daniel</td>\n<td>61643</td>\n<td></td>\n</tr>\n<tr>\n<td>51</td>\n<td>maggie</td>\n<td>61445</td>\n<td></td>\n</tr>\n</tbody>\n</table>\n<h2 id=\"why-is-password-hygiene-not-taken-seriously\" style=\"position:relative;\"><a href=\"#why-is-password-hygiene-not-taken-seriously\" aria-label=\"why is password hygiene not taken seriously permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is password hygiene not taken seriously?</h2>\n<p>Now that you've seen the worst passwords, you may want to <a href=\"https://www.loginradius.com/blog/2018/05/infographic-poor-password-hygiene-letting-cybercriminals-clean/\">improve the password hygiene</a> of your enterprise.</p>\n<p>But what if your customers don't follow good password hygiene? </p>\n<p>Unfortunately, many don't. The biggest reason is that remembering multiple passwords for multiple accounts is hard work. This leads to people using easy-to-guess passwords or recycled passwords which can lead to a domino effect of attacks on both consumers and companies. </p>\n<p>Another flawed approach is that people may think their information is insignificant, so they assume that no hacker would care about them. However, a ransomware attack can lock users out of their accounts and become quite costly.</p>\n<p><img src=\"/e9b93c8b923b38970dce3081e9a46938/image2.webp\"></p>\n<h2 id=\"how-can-you-improve-password-security\" style=\"position:relative;\"><a href=\"#how-can-you-improve-password-security\" aria-label=\"how can you improve password security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How can you improve password security?</h2>\n<p>As our worst passwords list shows, you can’t stop everyone from using bad passwords. However, you can prevent hackers from accessing passwords by using a Customer Identity and Access Management (CIAM) solution. Here’s how.</p>\n<p>An Identity Platform can help companies implement industry-standard hashing algorithms that protect passwords during transit or at rest. This is an effective way to prevent data from being exposed to hackers. </p>\n<p>With the increase in frequency and complexity of attacks, companies could also utilize additional features like two-factor authentication, risk-based authentication, and <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless login</a>.</p>\n<p>By implementing these features, companies can increase security to customer accounts that will help prevent data breaches and hacks.</p>\n<p>A CIAM solution also saves resources. Your support and development teams can devote their time to growing your business rather than responding to data breaches. </p>\n<p>Overall, bad passwords coupled with smart hackers are a big problem for  businesses. To protect your company from costly hacks and breaches, you need cybersecurity that prevents access to your sensitive data. For state-of-the-art cybersecurity and enhanced customer experience, choose a globally-certified CIAM solution like LoginRadius. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=worst-passwords-list-2019\"><img src=\"/084774eb7512c1b89a504206fda05ffc/CTA-book-demo-password-1024x310.webp\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 23, 2019","updated_date":null,"title":"The Worst Passwords of 2019","tags":["passwordless login","password management","data security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/cf8b7e1e5cc06a1c8074dc343cc7f342/7f8e9/worst-psswrd-list.webp","srcSet":"/static/cf8b7e1e5cc06a1c8074dc343cc7f342/61e93/worst-psswrd-list.webp 200w,\n/static/cf8b7e1e5cc06a1c8074dc343cc7f342/1f5c5/worst-psswrd-list.webp 400w,\n/static/cf8b7e1e5cc06a1c8074dc343cc7f342/7f8e9/worst-psswrd-list.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/best-practices-choosing-good-security-questions/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Security questions can add an extra layer of certainty to your authentication process.</p>\n<p>Security questions are an alternative way of identifying your consumers when they have <a href=\"https://www.loginradius.com/blog/identity/is-password-reset-ruining-cx/\">forgotten their password</a>, entered the wrong credentials too many times, or tried to log in from an unfamiliar device or location.</p>\n<p>So, how do you define a good security question? We have come up with some basic guidelines that will help you create the best ones. </p>\n<h2 id=\"what-makes-a-good-security-question\" style=\"position:relative;\"><a href=\"#what-makes-a-good-security-question\" aria-label=\"what makes a good security question permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Makes a Good Security Question?</h2>\n<p>The best security questions and answers make it easy for legitimate consumers to authenticate themselves without worrying about their account being infiltrated.</p>\n<ul>\n<li>If a question is too hard to answer due to complexity or changing circumstances, it can end up wasting your consumer’s time—and ultimately, it may keep them locked out of their account.</li>\n<li>If the answer is too quickly researched or there are too few possible answers, it can be easy for an attacker to gain access by guessing correctly.</li>\n<li>If the answer has favorite foods or colors, they change over time.</li>\n<li>If the answer has birthdays, it can be easy for an attacker to find online.</li>\n<li>If the question and answer have a school name or location too, such information is easily available for attackers.</li>\n</ul>\n<p>You can minimize both of these outcomes by creating good security questions. </p>\n<ol>\n<li><strong>Safe</strong>: Cannot be guessed or researched.</li>\n<li><strong>Stable</strong>: Does not change over time.</li>\n<li><strong>Memorable</strong>: Can be remembered.</li>\n<li><strong>Simple</strong>: Is precise, easy, and consistent.</li>\n<li><strong>Many</strong>: Has many possible answers.</li>\n</ol>\n<p><em>You can see examples of good security questions from the</em> <em><a href=\"https://sites.google.com/site/pwordsecuritykate/home/list-of-ideas-security-questions\">University of Virginia</a>. Let’s take a look at each of these criteria in more detail.</em></p>\n<h3 id=\"1-safe\" style=\"position:relative;\"><a href=\"#1-safe\" aria-label=\"1 safe permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Safe</h3>\n<p><img src=\"/cfccbee1abd82fe642d45c74a29257af/boy-car-child-1266014.webp\"></p>\n<p>When choosing security question and answers, it’s extremely important that the correct answers cannot be guessed or researched over the internet.</p>\n<p>Here’s an example of a question that fails to meet these rules:</p>\n<p><em>“In what county were you born?”</em></p>\n<p>This question could be considered unsafe because the information can be found online. Also, this information may be common knowledge to friends and family members.</p>\n<p>Aside from these issues, if a hacker was interested in a specific account, it might be easy to brute-force their way past this question since there are only a fixed number of counties in each US state.</p>\n<h3 id=\"2-stable\" style=\"position:relative;\"><a href=\"#2-stable\" aria-label=\"2 stable permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Stable</h3>\n<p><img src=\"/189de30533f62b867cacf6b107bbc320/balance-beach-boulder-1051449.webp\"></p>\n<p>A good security question should have a fixed answer, meaning that it won’t change over time.</p>\n<p>A good example of a security question with a stable answer:</p>\n<p><em>“What is your oldest cousin’s first name?”</em></p>\n<p>This example works because the answer never changes.</p>\n<p>Note: Questions like this one might not apply to all users. Asking about someone’s wedding anniversary or cousins does them no good if they have never been married or have no cousins! It’s important to offer your consumers several questions to choose from to make sure they apply.</p>\n<p>Some examples of questions with unstable answers:</p>\n<p><em>“What is the title and artist of your favorite song?”</em></p>\n<p><em>“What is your work address?”</em></p>\n<p>Both of these examples make for poor security questions because their answers will change for most people over time. Many people change their minds about their favorite things over the course of their lives, and they also may change jobs or move to a different office location.</p>\n<h3 id=\"3-memorable\" style=\"position:relative;\"><a href=\"#3-memorable\" aria-label=\"3 memorable permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Memorable</h3>\n<p><img src=\"/4fc4082864b7c38e16ef2e34ff1fe214/adorable-blur-child-573293.webp\"></p>\n<p>A good security question should be easily answered by the account holders but not readily obvious to others or quickly researched.</p>\n<p>Examples of good memorable questions:</p>\n<p><em>“What is your oldest sibling's middle name?”</em></p>\n<p>Most consumers who have siblings know their middle name off the top of their heads, making this a good example of a memorable security question. This question is also excellent because someone would have to do quite a bit of digging to first find out who the consumer’s oldest sibling is, and then find their middle name in order to crack this question.</p>\n<p><em>“In what city or town did your mother and father meet?”</em></p>\n<p>Most consumers know the answer to a question like this, making it fit the criteria of being memorable. It is also more difficult to guess or research this fact. Best of all, it fits the stability criteria as well.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-buyers-GD-to-MFA.webp\" alt=\"EB-buyers-GD-to-MFA\"></a></p>\n<p>Some examples of question and answers that are unmemorable include:</p>\n<p><em>“What is your car’s license plate number?”</em></p>\n<p>Many people don’t have their license plate number memorized. Also, it’s relatively simple for a potential intruder to do some digging and find this information for themselves.</p>\n<p><em>“What was your favorite elementary school teacher’s name?”</em></p>\n<p>The answer to this question may be quick to recall for someone younger, but for older consumers, things from their childhood can be a lot foggier. So answers to such questions might not come so easily. It’s good practice to try to avoid questions from a consumer’s childhood.</p>\n<h3 id=\"4-simple\" style=\"position:relative;\"><a href=\"#4-simple\" aria-label=\"4 simple permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Simple</h3>\n<p><img src=\"/fdbc69658c2ed437d337b773bef48e70/automobile-automotive-car-1386649.webp\"></p>\n<p>A simple question has a precise answer that doesn’t create confusion.</p>\n<p>Some examples of questions with simple answers:</p>\n<p><em>“What was your first car’s make and model? (e.g. Ford Taurus)”</em></p>\n<p><em>“What month and day is your anniversary? (e.g. January 2)”</em></p>\n<p>These both make for good security questions because the answers are specific. These questions show consumers how to format their answers in a memorable, simple way.</p>\n<p>But how many security questions should be asked? These questions can also be asked in a way that doesn’t give simple, precise answers:</p>\n<p><em>“What was your first car?”</em></p>\n<p><em>“When is your anniversary?”</em></p>\n<h3 id=\"5-many\" style=\"position:relative;\"><a href=\"#5-many\" aria-label=\"5 many permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Many</h3>\n<p><img src=\"/db48bdd45d6b2b4a72051be7819fe463/arms-bonding-closeness-1645634.webp\"></p>\n<p>A good security question should have many potential answers. This makes guessing the answer much more difficult and will also slow down automated or brute-force attempts at gaining access to the consumer’s account.</p>\n<p>An example of a question with many possible answers:</p>\n<p><em>“What is the middle name of your oldest child?”</em></p>\n<p>A question with too few possible answers:</p>\n<p><em>“What is your birth month?”</em></p>\n<h2 id=\"but-wait-is-there-any-such-thing-as-a-good-security-question\" style=\"position:relative;\"><a href=\"#but-wait-is-there-any-such-thing-as-a-good-security-question\" aria-label=\"but wait is there any such thing as a good security question permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>But wait. Is there any such thing as a good security question?</h2>\n<p>By their very nature, even so-called good security questions are vulnerable to hackers because they aren’t random—users are meant to answer them in meaningful, memorable ways. And those answers could be obtained through <a href=\"https://www.loginradius.com/blog/2018/02/phishing-for-identity\">phishing</a>, social engineering, or research.</p>\n<p>There’s a scene in the movie <em>\"Now You See Me 2\"</em> where a magician tricks his target into giving him the answers to his bank security questions. The magician guesses the answers and his target corrects him with the actual information. It’s a fictional example, but the phishing mechanics are real.</p>\n<p>Many social media memes tap into the answers to common security questions, such as the name of your first pet or the street you grew up on. So by innocently posting your superhero name or rapper name on Facebook, you’re inadvertently sharing important personal information.</p>\n<h2 id=\"security-questions-you-should-avoid\" style=\"position:relative;\"><a href=\"#security-questions-you-should-avoid\" aria-label=\"security questions you should avoid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Questions You Should Avoid</h2>\n<p>When it comes to creating security questions, there are certain types of questions that should be avoided. Questions that have answers that are easily guessed or found online should not be used.</p>\n<p>For example, questions like “What city were you born in?” or “What is your mother’s maiden name?” are too common and can be easily guessed or found online. Additionally, questions that are too personal or sensitive should also be avoided as they may make users uncomfortable or cause them to reveal too much personal information.</p>\n<p>Examples of questions to avoid include “What is your social security number?” or “What is your salary?”</p>\n<h2 id=\"list-of-good-security-questions-one-can-use\" style=\"position:relative;\"><a href=\"#list-of-good-security-questions-one-can-use\" aria-label=\"list of good security questions one can use permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>List of Good Security Questions One Can Use</h2>\n<p>Choosing good security questions can be challenging, but there are certain types of questions that can be effective. </p>\n<p>Good security questions should have answers that are easy for the user to remember but difficult for someone else to guess. For example, questions about personal preferences or experiences can be effective, such as “What is your favorite movie?” or “What was the name of your first pet?” </p>\n<p>Another effective approach is to use questions that require numerical answers, such as “What is your favorite number?” or “How many siblings do you have?”</p>\n<h2 id=\"security-question-best-practices\" style=\"position:relative;\"><a href=\"#security-question-best-practices\" aria-label=\"security question best practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Question Best Practices</h2>\n<p>When choosing security questions, there are several best practices to keep in mind. First, it is important to choose questions that are easy for the user to remember but difficult for others to guess or find online. </p>\n<p>Additionally, it is important to avoid using questions that are too personal or sensitive. Another best practice is to avoid using the same security questions for multiple accounts, as this can make it easier for hackers to gain access to multiple accounts if they can answer the same security questions. </p>\n<p>Finally, it is important to regularly update security questions and answers, as well as to use two-factor authentication or other security measures to further protect accounts. By following these best practices, users can create strong security questions that help protect their online accounts.</p>\n<h2 id=\"what-authentication-methods-are-good-alternatives-to-security-questions\" style=\"position:relative;\"><a href=\"#what-authentication-methods-are-good-alternatives-to-security-questions\" aria-label=\"what authentication methods are good alternatives to security questions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Authentication Methods are Good Alternatives to Security Questions?</h2>\n<p>Passwords and security questions aren’t the only methods for locking down consumer accounts. A good <a href=\"https://www.loginradius.com/blog/2018/03/top-5-business-objectives-that-ciam-solves\">CIAM</a> solution offers several secure alternatives:</p>\n<h3 id=\"1-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#1-multi-factor-authentication\" aria-label=\"1 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/two-factor-authentication/\">Multi-factor authentication</a> is a much more robust and secure method of consumer authentication that relies on two or more ways of verifying the consumer’s identity. Typically, the consumer will be required to present something that they know, something they possess, and/or something they are. Some examples of these different factors are:</p>\n<ul>\n<li>Something they know: A password, pin code, or an answer to a security question.</li>\n<li>Something they possess: Such as a bank card, key, or key fob.</li>\n<li>Something they are: A scanned fingerprint or retina, voice or face recognition.</li>\n</ul>\n<p>As an example, the <a href=\"https://www.mbna.ca/\">MBNA bank</a> recently decided that security questions were not doing enough for them and their consumers to keep their accounts safe. To upgrade their security, they decided to go with two-factor authentication instead of security questions in order to verify their consumer’s identities.</p>\n<p><img src=\"/a9e74f244312983ea9c5cdbc05750c92/MBNA-2factor-steps.webp\"></p>\n<p><em>Source: MBNA website</em></p>\n<p>In these screenshots, you can see that the transition from security questions to two-factor authentication was fairly seamless for MBNA consumers. They even had the option to choose how often they would be prompted to provide a security code as their second factor.</p>\n<p><img src=\"/3b9c4255681353f9abffd408adff699e/MBNA-2factor-login-options.webp\"></p>\n<p><em>Source: MBNA website</em></p>\n<h3 id=\"2-strong-password-rules\" style=\"position:relative;\"><a href=\"#2-strong-password-rules\" aria-label=\"2 strong password rules permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Strong password rules</h3>\n<p>By requiring your consumers to follow <a href=\"https://www.loginradius.com/resource/infographic/death-of-passwords\">strong password rules</a>, you minimize the risk of hackers brute-forcing their way into their accounts. Lengthy alphanumeric passwords with special and non-repeating characters are much more difficult for an attacker to guess. It also takes significantly longer for brute force programs to break in.</p>\n<h3 id=\"3-passwordless-login\" style=\"position:relative;\"><a href=\"#3-passwordless-login\" aria-label=\"3 passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Passwordless Login</h3>\n<p><a href=\"https://www.loginradius.com/passwordless-login/\">Passwordless Login</a> takes the password right out of the equation. consumers log in with a key fob, a biometric such as a fingerprint, or a magic link. This login method eliminates the issue of consumers forgetting passwords entirely, and it also makes it impossible for hackers to crack their accounts by brute-forcing.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>If you’re interested in learning why passwords are slowly becoming a thing of the past, download our e-book <a href=\"https://www.loginradius.com/resource/the-death-of-passwords/\">The Death of Passwords</a>. There are better authentication methods than passwords and security questions available for your company—and with support from LoginRadius, you can adopt them quickly and easily.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=best-practices-choosing-good-security-questions\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 31, 2019","updated_date":null,"title":"Best Practices for Choosing Good Security Questions","tags":["data security","password management","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a5bab7f381343fca3327beeab8ac5eb0/7f8e9/security-questions.webp","srcSet":"/static/a5bab7f381343fca3327beeab8ac5eb0/61e93/security-questions.webp 200w,\n/static/a5bab7f381343fca3327beeab8ac5eb0/1f5c5/security-questions.webp 400w,\n/static/a5bab7f381343fca3327beeab8ac5eb0/7f8e9/security-questions.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/"},"html":"<h3 id=\"the-dangers-of-bad-password-hygiene\" style=\"position:relative;\"><a href=\"#the-dangers-of-bad-password-hygiene\" aria-label=\"the dangers of bad password hygiene permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Dangers of Bad Password Hygiene</h3>\n<p>Many people use their email addresses and a small set of passwords (or even just one password) to log in to their online accounts. Unfortunately, this means that any hacker with your email address already has half your login details. Add in numerous password breaches from big-name digital service providers and you have a recipe for disaster.</p>\n<p>Since most people still recycle versions of their passwords, once one of them is released in a data leak, it could mean that all of your online accounts are compromised thanks to <a href=\"https://www.loginradius.com/blog/2018/12/infographic-the-death-of-passwords/\">bad password hygiene</a>.</p>\n<p>Even if you're one of the many people who use a selection of different passwords based on some sort of theme or the rearrangement of certain elements, an attacker could combine knowledge of one password with a brute force attack or social engineering to more easily discover your other passwords.</p>\n<h3 id=\"have-i-been-pwned-good-question\" style=\"position:relative;\"><a href=\"#have-i-been-pwned-good-question\" aria-label=\"have i been pwned good question permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Have I Been Pwned? Good Question!</h3>\n<p>Luckily there's a well-trusted website where anyone can quickly find out if their email address has been compromised in an email leak and which company leaked your data. Have I Been Pwned? (HIBP) was set up by <a href=\"https://twitter.com/troyhunt\">Troy Hunt</a>, a highly respected digital security expert.</p>\n<p>It’s simple to find out if your email address has been compromised. Just go to <a href=\"https://haveibeenpwned.com/\">Have I Been Pwned?</a> to search their database of leaked details.</p>\n<p>HIBP doesn't just include leaked emails, but (as my friend found out) other personal data that has been exposed on the web. What you learn may surprise you—I asked a friend to try a few of their emails, and though all of their passwords were safe, other bits of personal data had been leaked by several marketing data aggregation companies.</p>\n<p>Hackers make use of many types of personal data, combining databases with known passwords when they do leak to make cracking your accounts that much quicker, so any sort of data leak can be risky.</p>\n<p>Check a few of your emails on the site, and chances are that at least one of them will have been involved in a data leak at some point, even if your passwords haven't been released.</p>\n<p>There's also a handy <a href=\"https://haveibeenpwned.com/Passwords\">password checker</a> to find out if a certain password has made its way into the public domain. (Don’t worry, the site uses hashing to keep your password anonymous and doesn’t store it.)</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><img src=\"/50eb35550996efd860854fef81a6360e/RP-Data-Breach-Report.webp\" alt=\"Protecting-PII-Data-Breaches-industry-report\"></a></p>\n<p>Out of curiosity I checked the statistics for using \"password\" as a password—it turned out to have been pwned 3,533,661 times, a stark reminder that common sense doesn't always triumph when humans are left to their own devices <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">regarding password strength</a>.</p>\n<p>Subscribing to Have I Been Pwned is free and doing so will alert you to future leaks involving that email address as soon as they become public; adding additional emails is straightforward and doesn't incur any additional fees. As a website owner or administrator, you can also set up alerts that let you know if any email addresses associated with your domain have been compromised.</p>\n<h3 id=\"what-should-i-do-if-i-find-my-address-in-an-email-leak\" style=\"position:relative;\"><a href=\"#what-should-i-do-if-i-find-my-address-in-an-email-leak\" aria-label=\"what should i do if i find my address in an email leak permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Should I Do if I Find My Address in an Email Leak?</h3>\n<p><img src=\"/39c01c921f3c46b1823f193ca9711f75/image-2.webp\"></p>\n<h4 id=\"1-change-your-passwords\" style=\"position:relative;\"><a href=\"#1-change-your-passwords\" aria-label=\"1 change your passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Change Your Passwords</h4>\n<p>Once you’ve checked your email addresses for breaches, the next step is to change all of your passwords that are related to that email to something strong and complex. Choosing <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">strong, unique passwords</a> can be difficult for some people – believe it or not, a random string of letters, numbers, and symbols can be just as easy for a machine to crack as any other password.</p>\n<p>XKCD explains it pretty well in <a href=\"https://xkcd.com/936/\">this cartoon</a>; think “pass phrases” of unrelated terms, rather than just a “password.” And no, changing letters for numbers (l33t style) is far too common to make this a safe way to create a cunning password!</p>\n<p>If your password comes up as having been leaked on the password checker, it doesn’t necessarily mean that your personal password has been leaked. Maybe your choice of secret word wasn’t as unique as you thought it was.</p>\n<p>What it does mean is that your password is likely to be in a database along with other confirmed passwords that a cracker program will use first when trying a brute-force attack on your account. Combine a compromised password with a leaked email for an account without <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a>, and you’ve just handed anyone with those two databases full account access.</p>\n<p>And what do we mean by unique? Not unique to you, but unique to each site or login you use. Remember never to use any of your biographical data in your passwords either; many of the data breaches on Have I Been Pwned? are from marketing companies that don’t actually have people’s passwords. What they do leak is a handy, searchable database of lots of your other information (including things like kids’ birthdays, work anniversaries, and so forth).</p>\n<h3 id=\"2-use-a-password-manager\" style=\"position:relative;\"><a href=\"#2-use-a-password-manager\" aria-label=\"2 use a password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Use a password manager</h3>\n<p>Of course, with all these unique passwords, you may be tempted to write them all down. If you want to keep your new set of passwords safe, though, consider using a password manager (with a strong, unique password that you can remember). There are <a href=\"https://www.techradar.com/uk/news/software/applications/the-best-password-manager-1325845\">a number</a> of options, many of them free, that will help you store your passwords safely.</p>\n<p>LastPass and Dashlane are the two most popular options, and both have points in their favour. If you take your online security seriously, it’s worthwhile paying for a premium version.They’re relatively inexpensive and include important features like syncing across devices and advanced multi-factor authentication. Where possible, you should enable multi-factor authentication on all of your accounts.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">Leaks of any type of customer data</a> can be both embarrassing and expensive for businesses. An increasing number of countries have steep penalties for any kind of data breach, in some cases attracting unlimited fines or large percentages of an organization's annual turnover (yes turnover, not after-tax profit).</p>\n<p>If you're responsible for your company’s data security or digital platforms, then you're probably acutely aware of this fact.</p>\n<p>LoginRadius has a vested interest in maintaining the highest levels of data protection. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach\"><img src=\"/1bebf239d110701b9b534d7eb481a5ac/BD-Plexicon1-1024x310-1.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 10, 2019","updated_date":null,"title":"How Do I Know If My Email Has Been Leaked in a Data Breach?","tags":["data security","password management","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/839f9883679c43c535a5a5c6dfdd1e69/7f8e9/email-breach.webp","srcSet":"/static/839f9883679c43c535a5a5c6dfdd1e69/61e93/email-breach.webp 200w,\n/static/839f9883679c43c535a5a5c6dfdd1e69/1f5c5/email-breach.webp 400w,\n/static/839f9883679c43c535a5a5c6dfdd1e69/7f8e9/email-breach.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]}},"pageContext":{"tag":"password management"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}