Latest Posts

Many business owners use random password generators to create unique but easy-to-remember passwords for their users. Generating secure and easy-to-remember passwords is important for both your business protection and your data's safety. Yet, hackers are getting smarter by the day, with more sophisticated technology to decipher common passwords. Let's take a
Read More

Cases of identity theft and fraud in the US are on the rise, with 4.8 million incidents reported in 2020. That’s an astounding 45 percent increase from the 3.3 million incidents reported in 2019.  Most incidents of identity theft happen online, given that most Americans have moved a large part of
Read More

Cloud data storage has become one of the most prominent areas of the tech sector in recent years. Most of the smart technology you purchase has access to at least one type of cloud environment.  Computers come with built-in cloud storage options that can help you backup your photos, videos, and
Read More

Cyberattacks can deal massive damage to your business. They affect your business standing and consumer trust. They target various aspects of your system, including logins and other relevant information. Among the cyberattacks that occur, 45% utilize hacking. About 22% come from phishing, and 17% involve malware use. As the number of methods for cyberattacks increase, the
Read More

Illustration of 5 benefits of a team password manager by LogmeOnce with diverse professionals using tech devices.

5 Benefits of a Team Password Manager

Do you own an online business? There are over 1.8 billion websites on the internet. As technology continues to advance, people are beginning to migrate to the internet. From regular lives to businesses, online platforms are becoming the new normal. So much of the internet holds our personal information, like names and bank accounts. Hackers now have more advanced technology to gain access to our accounts. Some experts claim that we are now more vulnerable to cyber-attacks. Do you want to protect your business? Consider using a team password manager! In this article, we show you some of the benefits of using a password manager for a team. What is a Password Manager Your password is one of the first lines of defense when you own an account. Many websites require capital letters, numbers, or special symbols to encourage strong passwords. Some people use different passwords across different platforms. However, it can be hard to remember all of these passwords. A password manager is an app that allows you to store your login credentials. It encrypts this information to prevent hackers from stealing it. Some password managers can give you a strong and unique password for each account. It will also autofill your login information. All you need is to remember the “master password” to access your other passwords. Types of Password Managers You can find many types of password managers. Some base their services on storage, features, or technique. Here’s a quick run-down of the different types of password managers. Desktop-Based This is one of the most popular and oldest forms of a password manager. It stores and encrypts your password in a localized desktop machine. Cloud-Based Cloud services allow you to upload resources on an online server for easy access from “any where and anytime”. A cloud-based password manager does the same for your passwords. It transmits your information through a secure communication channel. Browser-Based Your default search engine might already have a built-in password manager. Some apps, like Firefox and Chrome, allow you to store and manage your login information. Unfortunately, hackers always target vulnerabilities in web browsers so that they can exploit them as thoroughly as possible before they’re patched. This may be the least secure type of password manager. Portable You can use a portable device like a mobile phone to store your login information. You may also an HDD or a USB stick. Token-Based Token-based password managers give you an extra layer of security. It uses multi-factor authentication. Stateless This type generates random passwords. They use a master passphrase provided by the user. They may also use a key derivation function to generate a tag. How Easy is it for Someone to Get Your Password Data and security breaches occur every day. A hacker can access a company’s system through the weakest part of their systems. Through this, they can access passwords, emails, and other sensitive information. Cyberthieves can also exploit account or device vulnerabilities to steal information. It can range from weak passwords to outdated software. Birth dates and pet names are also the easiest to guess. Some hackers use malware to steal information. If you have outdated software or antivirus apps, you may suffer from malware attacks. Other cyberthieves use keyloggers to access sensitive information. Online businesses are not immune to cyberattacks. If you have a business website, it may hold sensitive information about your team or customers. The pandemic forced many businesses to turn to online means. Whether you’re new to eCommerce or have been in it for a while, you need to prioritize security. Here are some of the benefits of using a team password manager. 1. Manage Shared Accounts Managing passwords for a team can be a hassle when running a business. It can be more difficult if more than one person needs to access one account. Example – more than one employee may need access to FedEx or UPS to ship overnight packages, but would not need to know the actual passord is “%Mn*frzx4@ghT” . With a team password manager, you can securely share, change and manage passwords. Get an app that enables one person or administrator to access the master password without sharing it with other account holders. You can add or remove access for any member of your team. 2. Create Stronger Passwords A team password manager allows you to create stronger passwords using “Password Generator” and/or “Password Calculator”. Since you don’t have to remember them all, you can create unique passwords for each account. You can set up security standards for logins. If you work with a team, a password manager can help you set up security protocols. You can assign the necessary length and complexity of a password. You may also enable 2FA and keep track of app updates. 3. Auto Log-in to Sites Your chosen app is not only a tool for managing passwords. You can also use it to auto-login to your website. Remember that if you’re using a password manager app, assign your browser not to remember passwords. This will prevent a hacker from accessing your password vault. This can also help you save time if you have multiple accounts. 4. Secure More Than Passwords Your app can store and secure more than your login credentials. Some password managers can store password recovery questions. You can record answers, but disable your password manager from auto-filling them up. You can also save your credit cards and membership cards. If your website has a company credit card, a password manager can help you secure it. You can also store notes and other sensitive information that you can only share with your team. 5. Alerts You from Potential Security Breach Most phishing scams occur when you open a suspicious email. Phishing is when fake spam emails look like they come from a legitimate sender. It contains links asking you to click on which can harvest login details when opened. A password manager can alert you to phishing sites. A high quality password manager will compare

Read More »
Blogging-Tips-LinkedIn-Post-Header

What Is a Password Book & Should You Use One?

Our modern lives involve the everyday use of technology. More specifically, we are continually using digital devices that let us go online. The internet has changed the way we live our lives. We can now manage our finances online, order products, book appointments, and so on. It has certainly made things a lot simpler and more convenient. However, the use of the internet also carries certain risks that revolve around security. After all, you don’t want anyone getting into your account, stealing valuable information, or money. The weakest link in online security is often the password. Most people create simple passwords because they are easy to remember, but this makes their passwords easy to figure out. This is why you should consider using a password book for all your accounts. What is a Password Book? We have countless accounts on our devices, and all of them have passwords. Remembering them all can prove to be a challenge. Also, many third-party apps are designed to help you save your passwords. But what happens if your device gets hacked? This is why many decided to take an alternative route to protect their passwords. Instead of storing them digitally, they figured that putting passwords on paper would be a better idea. Password Books are specially designed books where you can write down your password. It might sound crazy, but it’s actually not a good idea. We forgot the art of writing things down. Our computers remember everything for us. This has become a vulnerability, and this is why password books were created first and later password managers.. Why is Paper Back? It might seem counter intuitive to use a low-tech option for problems that revolve around techy stuff. Isn’t it better to use digital technologies to save up your passwords and manage them? Unfortunately, things aren’t that simple for some people. The first reason why this option has been used is that people feel overburdened with digital technology. Everything is done online. There are countless procedures, methodologies, and passwords we have to keep in mind when doing something. There’s no simplicity anymore. This can be a challenge for many people, especially if they haven’t grown up with computers. For example, people who are over 70 years old will always find it more challenging to learn how to do new things on computers. Why You Should Consider Using a Password Book Yes, all of this might sound strange. We are living at the peak of computer technology, why should we turn back to paper? Before you completely shut down this idea, make sure to read some of the reasons we talk about below and see for yourself if this might be a good idea. Password Books are Simple People often use password managers that are too complex. They misuse these tools without fully understanding them. This often causes security issues. People often even lock themselves out from their passwords and accounts. This is where the real headache starts. It could take months to get all of your passwords back. With password books, there are no similar scenarios. It’s all between you and a good old piece of paper. You simply write down all the passwords for your accounts. You can divide them in any way you want. For example, each page can be for one account, or you can write the names of the account and their passwords underneath. Simply put, everyone knows how to write things down on paper. You don’t need a manual or a list of instructions to understand what you’re doing. No Hacker can Access Your Password Books! The most apparent thing about password books is that they are in the physical world. Simply put, nobody can get to them. If you put your book in a safe place, there is almost a 0% chance that anyone will ever see it or find it. At the same time, criminals aren’t aware that you can store your passwords this way. Everyone thinks that people save up their passwords on their browsers or in some digital documents. This is where the counterintuitive approach works its magic. Digital password managers can help protect your passwords. However, if you manage them poorly or make mistakes online and let someone breach your computer, they can become a huge liability. If someone accesses your password manager, they’ll be able to get into all of your accounts. They are Easy to Understand Again, we go back to one of the essential things – simplicity. Whenever you want to read a password or remind yourself of one, open your book and read it. Everyone can do this very quickly, and you can even carry your book along with you in a bag. That way, you can access all of your accounts from your mobile device while on the go. It might seem like a hassle, but losing tons of personal information or money online can be far worse. At the same time, we mentioned older folks that need to find a way to memorize all of the passwords. But they need to do this safely. This is where password books can be beneficial. They are neatly categorized, stored, and you can find some with large fonts. This makes it easy for anyone to write down and read their passwords. Conclusion In the end, password books let you write any kind of password. No matter how complex the account login is, how many steps are there, what information you need to type in, or how complicated your password is, you can put them all down on paper and read with ease. A lot of password books come with pages filled with categories and additional information you can type in. If you like, you can even create puzzles, riddles, or write down passwords in your own secretive way that nobody else would understand. This will make your accounts completely secure. That begin said, I highly recommend you to use password manager to secure your passwords effectively.

Read More »
Choosing the best password manager for businesses - illustration with two people on phones.

How to Choose the Best Password Manager for Business

Properly securing your data is one of the most important obligations that entrepreneurs are tasked with. After all, the cybercrime industry is estimated to reach $6 trillion and worth by the beginning of 2021. Incorporating a reliable password manager is a big step toward safer data. But, not everyone knows where to look for while choosing one.  Not quite sure how to begin? We’ve got all the info you need. Let’s explore everything you should keep in mind when it comes to when choosing the best password manager for business purposes. Quality Password Generation As you may expect, one of the most important attributes of a quality password manager for your company is its password generation algorithm. To elaborate, the safest passwords are ones that include random strings of numbers, letters, and special characters. So, there’s a huge difference between a password like waves96 and d#gz8q5^56wtr%2sb. It’s also important to understand why these complicated passwords are integral to optimizing your data security. Many hackers implement a method known as ‘brute-force hacking’ when looking to compromise information. As the name suggests, this involves repeatedly guessing a potential password over and over again until they’re able to find the right one. Hackers typically make use of a large number of compromised computers to help facilitate this endeavor. So, a long, complex password is exponentially harder to guess than a shorter one. Secure Access A password manager won’t do you much good if anyone who is using your device is able to access the passwords stored within the software. Instead, your password manager should require a master password before any other information is displayed. Otherwise, all somebody would need is your device’s login info in order to gain access to all of this data. Since businesses are inherently more at risk than individual users, it’s best to choose a password manager that has two-factor authentication. This will allow you to prevent unauthorized access to your list of passwords, keeping your data far safer. End-to-End Encryption The only way to keep your data as secure as possible is by incorporating end-to-end encryption. This term simply means that nobody but the user is able to access password information. If a password manager’s provider is able to see password data, then a data breach that occurs at this company could cause your information to get leaked onto the Internet. In combination with brute-force hacking and other traditional hacking methods, you could quickly find your accounts compromised by a third-party. It’s important to know, though, that you’ll be entirely responsible for remembering your master password since your provider won’t be able to facilitate access to it if you forget it. As such, you should take the appropriate measures to ensure this information doesn’t fall into the wrong hands.  Browser and Operating System Support In general, most password managers will have no trouble integrating with popular browsers and operating systems. This is particularly important for businesses that don’t always use the most current version of a software. Common reasons for this include the fact that older software occasionally has more favorable licensing terms. In other scenarios, newer software can actually make the use of certain programs impossible. This type of incident was a point of contention regarding Apple’s Catalina operating system, as it made the vast majority of 32-bit plug-ins unusable. Businesses that made use of software that was only offered in 32-bit format found themselves either searching for an alternative solution or downgrading to a previous version of their OS. Keep this in mind when browsing potential password manager options so that you can find one that accommodates all of your company’s needs. Otherwise, you may find yourself spending additional time while searching. Ongoing Development Unfortunately, cybercriminals are continually making advancements in the techniques that they use to compromise data. This is one of the primary factors why the cybercrime industry is projected to be worth so much money by the end of this year. Fortunately, there are just as many advancements being made in data security. In order for current password management technology to remain effective, it’s imperative that developers continually improve their software. This often comes in the form of enhancing the passer generation algorithms, pushing frequent security patches, and being transparent when it comes to the known vulnerabilities of their software. Otherwise, it’s highly likely that a hacker can gain access to all of your password-related information. A data breach can easily be crippling for a business of any size. For example, the Equifax data breach that occurred in 2017 caused a large amount of disruption in the company’s operations. In this incident, they also had to compensate clients and customers who were negatively impacted by the data breach. For smaller businesses that don’t have a ton of capital to work with, this could be potentially impossible to recover from. You should be able to easily locate development history on your provider’s website, so be sure to take a look before making a decision. Choosing The Right Password Manager for Business Purposes Can Seem Complicated But the above information will make the process far smoother. From here, you’ll be able to ensure that you choose the best password manager for business and help protect your company’s data as you continue to scale. Want to learn more about what we have to offer? Feel free to reach out to us today and see how we can help.

Read More »
Enterprise password management tips to avoid common mistakes, LogmeOnce branding, blue background with device icons.

Enterprise Password Management Mistakes You Don’t Want to Make

In order to keep your company as safe as possible, you’ll need to take every precaution you can when it comes to protecting your company data. Even a minor data breach could cause a significant lapse in revenue, and it’s not impossible for the scenario to result in the exposure of your trade secrets. So, there’s a handful of steps you need to take when it comes to proper enterprise password management. Not quite sure how to begin? We’ve got all the info you need. Let’s explore everything you should keep in mind.  Using The Same Password for Multiple Accounts Unfortunately, this is one of the most commonly-seen mistakes when it comes to business password management. Many entrepreneurs tend to use the same password across multiple platforms simply for the sake of being able to remember their login credentials. While this may make things more convenient in the short term, you’re putting yourself and your company at significant risk. This issue becomes even more serious if you also use the same email or username across different platforms. Instead, you should use a unique password for each account that requires login information.  Using Simple or Easy-to-Guess Passwords People are often warned that their passwords need to be a certain level of complexity in order to be sufficiently secure. Interestingly, most users assume that this is because someone would be able to sit down and guess their login info. This isn’t an impossible scenario, but there’s a much greater risk at play here— brute-force hacking. For those who are unfamiliar with the term, brute-force hacking is a method that cybercriminals use to guess a user’s password. As the name suggests, it involves hundreds or sometimes thousands of login attempts until the correct password has been found. It’s important to note that these individuals often use compromised computers during their attempt to gain access to an account, so they have far more than the conventional two or three incorrect attempts the most platforms impose. As a result, simple passwords put you at a far greater risk of having your account compromised.  While it may seem difficult to manage a large number of passwords across different platforms, making use of a quality password manager can help you accomplish this task in the most secure way possible.  Improper Password Security Password won’t do you much good if it’s written down on a sheet of paper that anybody can access. Similarly, it’s highly recommended to only provide access to an employee if that data is directly relevant to their role. For example, there’s no reason an entry-level employee should have the same level of access as a manager would. You also run the risk of having your workers exchange passwords with each other if you don’t properly train your team about data security. A common scenario could include one employee messaging another and asking them to use their login info while they’re out of the office. Not only does this provide unauthorized access to the inappropriate party, but this password could be compromised by other individuals if those employees do not properly secure their devices.  Foregoing Multi-Factor Authentication Multi-factor authentication is an additional layer of protection that provides a significant amount of extra security. Put simply, it requires extra information after you input your password before you can access your account. Depending on what type of platform you’re using, you may receive an email or text message that has a code you’ll need to input. In other scenarios, you may be asked to provide additional personal info. Some platforms even allow you to customize what type of information you’ll need to provide during multi-factor authentication. While this method isn’t entirely foolproof, it goes a long way toward keeping your company’s data secure. It also comes with the added benefit of you being alerted when there’s a login attempt that you’re not responsible for. For instance, if you receive an email asking for a verification code and you didn’t attempt to log into that platform, you’ll know that someone is trying to access your account, and you should change your password immediately.  Storing Passwords in Your Web Browser This is an additional vulnerability situation where convenience is often chosen over security. Most web browsers ask you if you’d like to store your password after you enter it for the first time. Many people decide to do so simply so they don’t need to remember this information in the future. Unfortunately, hackers always target vulnerabilities and web browsers so that they can exploit them as thoroughly as possible before they’re patched. One of the most common results is a cybercriminal getting access to a wide array of usernames and passwords. While many of these could be relatively useless to them, such as to a social media account, login credentials for business accounts often prove to be immensely profitable information for them to access. Instead, it’s recommended that you decline to let your browser store this information. It Can Seem Complicated to Incorporate Proper Enterprise Password Management But the above information will make the process far smoother. From here, you’ll be able to ensure that your enterprise password management practices are sufficient enough to protect your company’s sensitive data from falling into the wrong hands.  Want to learn more about what we have to offer? Feel free to reach out to us today and see how we can help.

Read More »
Cartoon figures discussing password manager tips on blue tech-themed background.

Password Manager Tips You Need to Know

Did you know that hackers can guess your password in as soon as a fraction of a second? For the most part, this depends on the complexity of your password. However, the more complex your password is, the harder it is to remember. And you have to remember a lot since you should use different passwords for each of your accounts. Otherwise, then a single security breach can render it useless. That’s why getting the best password manager is a must. It generates strong passwords for you, and it keeps them, so you don’t have to remember it. Keep on reading to learn some tips on how to manage passwords using it. 1. Get the Right Password Manager You should first confirm the security features of the password manager. At the least, look for the following features: Zero-Knowledge The password manager you use should operate on zero-knowledge security architecture. In this type of encryption, hackers or even the provider’s staff doesn’t know your passwords. It encrypts your data in your device before they’re transmitted to the servers. All they host in their servers are a bunch of gibberish. Thus with Zero-Knowledge technology your data is NOT saved in clear text format. Even if hackers were successful in getting in, they wouldn’t get any useful data at all. Similarly, employees of password management software provider will not see your data in clear text and will be in gibberish format. Anyone other than you would still need your master password, the encryption key. It unravels the gibberish and turns it into readable data. It isn’t hosted on the provider’s servers, though. That’s why you should review the security and encryption practices of the password manager before committing to it. Two-Factor Authentication Two-factor authentication is the minimum security requirement. Don’t get a password manager without it. While zero-knowledge encryption works in protecting your passwords on the provider’s side, two-factor authentication gives you protection on your side. Sometimes, the risk is higher on the client’s side. There’s the risk of having malware that tracks your keystrokes. You could also misplace the password somewhere accessible to anyone. This is where the two-factor authentication comes in. Aside from the password, you’ll need to enter a randomly generated code sent to your phone. This way, no one will get into your password manager, whether it’s your snoopy co-worker or a hacker, without getting hold of your phone as well. On that note, check if it automatically logs you out if there’s no activity in a certain amount of time. 2. Choose the Right “Master” Password While the password manager handles all your other passwords, you still have to think of one solid master password for it. Since it can access all your important accounts, like your email address, social media profile, mobile banking apps, and more, that master password must be the strongest you’ll ever make. Never include any personal information anywhere in the master password. That includes a name, a birthday, any other important date, or even your favorite hobby. These are available on the internet with some snooping around. With the amount of information we put out online, a hacker may even be able to find out the name of your first pet. It goes without saying that you also shouldn’t put obvious combinations of letters and numbers, like 1234 or abcd. Avoid common passwords! There are cracking tools that try every combination of words in the dictionary. Whatever password you settle for, though, make sure to remember it. Don’t store or write it anywhere, like in a post-it note or your cellphone. This is the number one rule in all password managing tips. Choose a password that’s strong and memorable to you at the same time. 3. Update Your Password Manager Often Whatever password manager you’re using, make sure to always update it as soon as possible. Hackers find exploits every day, although security companies are also constantly on the lookout for vulnerabilities that hackers may use. Doing so, they find new ways to strengthen the safety and security of your data. Some companies provide automatic security updates, meaning as soon as you login to their security product, you will be automatically receiving latest security updates. This is why getting the latest updates is important. Through these updates, providers fix bugs, patch vulnerabilities, deploy new security features, and so on. If you don’t update as soon as it releases, you risk getting exposed to any security flaw they might have found. Hackers can then use these to get into your data. Before you get hung up on these security flaws, though, know that there’s nothing that is 100% safe and secure. There are always going to be vulnerabilities, but do they make password managers a waste of time? The answer is a resounding no. Logging into social media, searching on the internet, and every activity has risks. Unless you’re going to live a tech-free life, you’re going to have to live with security risks. The thing is there’s something safer and more secure. And it’s your job to always choose the safest and most secure option. Password managers are safer and more secure. You should still use one to strengthen your protection against data theft and more risks. This is also why choosing the best password manager is important. They must have tight security and the latest encryption knowledge. 4. Stay on Top of Your Data’s Security Like we said above, hackers and security providers are always in an arms race. Sometimes, one is ahead of the other, while at other times, the other is ahead. You shouldn’t watch from the sidelines, though. You also have to do your job in keeping your accounts secure. Keep yourself updated with the latest data breaches. You can check stuff online like the security of your email address if a recent hack compromised it. You also need to be careful about phishing scams. It’s a threat that’s designed to fool you into thinking you’re safe. It’s disguised as a legitimate email,

Read More »
blog-images_featured-dave

Why Passwords Are Cybersecurity’s Weakest Link

“I’m afraid people will remain the weakest link in security, and the vast majority of cybercriminals go after this lowest hanging fruit. It’s the least effort for the most reward.” Introduction At Logmeonce, we’re focused on helping protect you against cybersecurity threats. We do this in many ways. First, we provide you with a suite of tools, including a password management tool, to help keep your passwords safe.  However, technology itself can’t solve all of our security woes (as we’ll soon discuss below). Education plays a big role in staying safe online. For this reason, from time to time, we bring in cybersecurity experts from around the world to help educate you, our blog readers, about the various ways you can protect yourself online.  Today, Logmeonce had the opportunity to chat with Dave Witelegg, a cybersecurity expert, about his involvement in the cybersecurity space.  We have an exciting interview planned for you today, so without further ado, let’s jump in!   The Interview Hello and thank you for taking the time to chat with our blog readers today Dave. You have over 25 years of commercial experience in just about everything related Cyber and Information Security, whether it’s firewalls, biometrics, encryption, operating system security, cybercrime, hacking techniques, data protection, information security management, cyber threat and risk assessing, threat intelligence, payment card security, and even pioneering Satellite VPN connectivity. But let’s start this interview by rewinding back to your early days in the cybersecurity space. What motivated you to get involved in this space? What drew you in in the first place? I have always been fascinated in how technology works, as a young boy in the 1980s I recall taking apart one of the early home budget computers released in the UK, a ZX Spectrum, just to satisfy my curiosity on how this to space-age new technology worked. My inquisitiveness led to break into and recode one of the early football team management ZX Spectrum devices, allowing my football team to have the most money, best players and always win matches. I didn’t know it at the time, not only was I teaching myself how to write code, but the process I was undertaking was hacking, persistently making repeated trial and error attempts until I achieved the outcomes I wanted. When I look at new technology today, I still seek to thoroughly understand how it works, naturally thinking about the weaknesses which could be exploited, and the negative impact of such exploits on the people and businesses using the technology. I developed a kind of a ‘hacker’s eye for business’, this in addition to understanding the motives of the threat actors, makes a good fit for an enjoyable and rewarding career in cyber and information security. Cybersecurity was a very different space 25 years ago. How do you feel the balance of power has shifted within the cybersecurity space within the last 25 years? Do you feel that cybersecurity is becoming better and harder for hackers to penetrate? Or do you believe that advances in technology are only temporary patches that hackers eventually find ways to work around? Over the last 25 years who has been winning in the game of cat and mouse? How have you seen the balance of power shift during the last 25 years? We are all more reliant on technology than any point in our history. In the last 25 years we have seen an information technology revolution, with IT steadily becoming more complicated, widespread and connected. Today we all carry powerful persistently globally connected computers in our pockets, a technology which empowers and enriches our everyday lives. However, this tech revolution also means the attack surface and opportunity is also greater than ever for a growing army of globally connected malicious actors. Today it doesn’t take a great deal of skill or even technology to become a proficient cybercriminal, indeed, technology like cryptocurrencies, the dark web and even YouTube tutorials are aiding bad actors on a global scale to commit nefarious acts. So the unwinnable security game of cat and mouse, has got a whole lot bigger over the past 25 years, and when security stands still, the bad guys always win. Let’s talk a little bit more about password security for a moment. You mention on your blog a case where a Ring camera was compromised and a hacker gained access to a young girl’s room through her camera and then proceeded to have a conversation with her. This hack seemed to be caused by “password stuffing”. Have you noticed an uptick in the amount of IoT device hacks, not due to the device itself being compromised, but due to weak passwords? In many of these cases where the hackers target an IoT device, what are they often looking to gain from the hack? Passwords are and have always been an Achilles Heel in cybersecurity, especially with IT systems connected to the internet, such as IoT devices like the Ring camera. The first issue with password security is people choosing a weak strength password, to help them easily remember them. Cybercriminals know this too well, so will try all the most popular and commonly used passwords obtained from past data breaches, to attempt to break into the online accounts. The second problem is people use the same exact username and password credentials on multiple online accounts, so if one account password is compromised, which may not even be the account holders fault perhaps due to a compromise of a third party website, cybercriminals are able to use the same stolen credentials to log in to other online accounts the user might have. Typically the bad actors will attempt to access popular online email accounts, social networking and popular eCommerce websites. These types of attacks using stolen credentials can be performed on mass in so-called ‘credential stuffing’ attacks, which automates the process and reveals accounts where the same credentials are used. One effective method to safeguard the inherent insecurity of passwords is to enable

Read More »
blog-images_featured-georgia

The Rise of Mobility and Mobile Cyber Attacks

“But the red team fascinated me. It was just simple stuff like putting up message boxes on our systems that said, “I like turtles” and using remote administration tools like Nuclear RAT or Poison Ivy, but not knowing anything about hacking I thought it was the coolest thing in the world. Like a future virtuoso hearing the sound of the cello for the first time, I realized that all I wanted to do was be able to do that.” Introduction At Logmeonce, we’re focused on helping protect you against cybersecurity threats. We do this in many ways. First, we provide you with a suite of tools, including a password management tool, to help keep your passwords safe.  However, technology itself can’t solve all of our security woes (as we’ll soon discuss below). Education plays a big role in staying safe online. For this reason, from time to time, we bring in cybersecurity experts from around the world to help educate you, our blog readers, about the various ways you can protect yourself online.  Today, Logmeonce had the opportunity to chat with Georgia Weidman, founder and CEO of Bulb Security. She is also a serial entrepreneur, penetration tester, security researcher, speaker, trainer, and author. She holds an MS in computer science as well as holding CISSP, CEH, and OSCP certifications. Her work in the field of smartphone exploitation has been featured internationally in print and on television. We have an exciting interview planned for you today, so without further ado, let’s jump in!   The Interview Hello and thank you for taking the time to chat with our blog audience today about your experience in the cybersecurity space. Can you begin by telling us a little bit more about your early days within the cybersecurity space? What was it about this niche that grabbed your attention and never let go?  I studied Math as an undergrad. I wanted to just be in a lab doing math problems all day, but quickly realized in graduate school that those kinds of positions were hard to come by. So, I switched to computer science in graduate school since it seemed like I could at least get a job in that. In graduate school, we competed in the Mid-Atlantic Collegiate Cyber Defense Competition. Don’t get me wrong, being on a student team getting pulverized by the professional attackers on the red team, yelled at by the mock CEO for services being down due to said red team, and having to figure out things like how to set up Active Directory on the fly made me want to vomit from the stress. But the red team fascinated me. It was just simple stuff like putting up message boxes on our systems that said, “I like turtles” and using remote administration tools like Nuclear RAT or Poison Ivy, but not knowing anything about hacking I thought it was the coolest thing in the world. Like a future virtuoso hearing the sound of the cello for the first time, I realized that all I wanted to do was be able to do that. It didn’t hurt that as a security researcher I could totally sit in a lab all day doing math-like problems. Your work in the realm of smartphone exploitation has been featured internationally in different media channels. You were also awarded a grant to continue your work within the field of mobile device security. What is it about mobile device security that you find so fascinating? Why is this an area of specific interest to you? There wasn’t any particular plan behind it. I did my first research project and presented at Shmoocon on SMS based botnets, before it became in vogue for attackers to do just that. Then the DARPA Cyber Fast Track program started and I was encouraged to apply. I needed some major research project and it occurred to me that mobile was just as vulnerable as anything else to phishing attacks, local privilege escalation attacks, and even remote code execution and client sides as any other platform. Yet it wasn’t, and still isn’t other than my products, being served by the security testing market. So, I proposed creating a tool for doing penetration testing for mobility and was accepted by DARPA. The rest, as they say, is history. So mobile became my niche. I often consider doing a research project on something completely different just to keep people guessing.  All of your hard work has paid off and resulted in you being able to release an open source project into the world called “Smartphone Pentest Framework” or SPF. Can you tell us a little bit more about what SPF is and how it contributes to the world of mobile security? Why did you decide to make it open source?  Well SPF was the result of my DARPA grant. The idea was to comprehensively be able to simulate the same attacks attackers use against mobile — from phishing to client sides to simulated malware and post exploitation. SPF has now been folded into Shevirah’s Dagah product line for enterprise security testing and monitoring. It’s not open source any more since my investors didn’t want it to be, but there is still a free edition with all of the features of SPF and more.  The free edition is aimed at students and security researchers wanting to test their personal device or do mobile security research as opposed to penetration testing a client or doing continuous monitoring of an enterprise with the professional and enterprise editions respectively. On the topic of mobile security, what three pieces of actionable advice would you give to smartphone users who have little understanding of complex security issues at play, but want to keep themselves protected the best they can? Take mobile phishing seriously. So many security awareness programs focus solely on email. People are learning not to click on suspicious links in emails, but you can be phished any way a link can be served to you. Mobile services

Read More »
blog-images_featured-lisa

How Tech and Education Improve Cyber Hygiene

“The (educational) information delivered to end users needs to be simple and easy to follow without complex language, jargon or acronyms.” Introduction At Logmeonce, we’re focused on helping protect you against cybersecurity threats. We do this in many ways. First, we provide you with a suite of tools, including a password management tool, to help keep your passwords safe.  However, technology itself can’t solve all of our security woes (as we’ll soon discuss below). Education plays a big role in staying safe online. For this reason, from time to time, we bring in cybersecurity experts from around the world to help educate you, our blog readers, about the various ways you can protect yourself online.  Today, Logmeonce had the opportunity to chat with Lisa Ventura,  an award-winning Cyber Security consultant and is the CEO and Founder of the UK Cyber Security Association (UKCSA), a membership association that is dedicated to individuals and companies who actively work in cyber security in the UK. She has over 10 years’ experience in the cyber security industry and is passionate about raising awareness of being more cyber aware in business to help prevent cyber-attacks and cyber fraud. We have an exciting interview planned for you today, so without further ado, let’s jump in!   The Interview Hi Lisa and thank you for taking the time to speak with our blog readers today about your experience in the cyber security space. You’ve been involved in cyber security since 2009. Can you kick off the interview by telling us a little bit more about how you got into the cyber security space? What was it about the industry that pulled you in and never let you go? In 2009 my ex-husband founded a cyber security software development company called Titania Ltd from our home office. I joined to help him develop it and at the time it was just the two of us from home (although he was still working full-time employed as an ethical hacker when he founded the company). We soon moved into offices and employed our first members of staff, and the company grew quickly. I loved all aspects of cyber security, especially the psychology of hacking, the mind of a hacker and of raising awareness of the importance of cyber security, especially within businesses of all sizes. When my ex-husband and I separated and divorced in 2012 I knew I wanted to stay in the industry. After a short contract at a locally based charity to get me back on my feet again I joined BT and worked on their Assure Cyber product. After that I undertook a wide variety of cyber security contracting work and founded the UK Cyber Security Association. Can you tell us a little bit more about what a typical day looks like for you as a cyber security specialist? I’m sure it always changes, but for those thinking about getting into this field, who might want to learn more about what a typical day looks like, how would you describe that to them? I am currently undertaking some work for Pinsent Mason’s solicitors as a cyber security awareness consultant, as well as running the UK Cyber Security Association. No two days are the same, but some of the tasks that I would undertake in a day includes working on crunching data following phishing email simulation exercises, putting together powerpoint decks on things such as ransomware, phishing, identity badge security for the senior partners at Pinsent Masons, updating the UK Cyber Security Website with the latest data breaches and threat reports and updating the UK Cyber Security Association’s social media channels with any cyber security breaking news that would be of interest to our audience. In addition, I will work on sending email bulletins out to our members, organising events, webinars and liaising with our event partners. You’re a leader when it comes to inspiring other women to get involved in the cybersecurity space. You even wrote a book on the topic. On your website you mention “few women pursue careers in cybersecurity, but those who do are shattering the glass ceiling and contributing to the safety and security of the internet, the CNI and our day to day lives.” Why do you think it is that few women pursue careers in cyber security? I think that women today might be interested in cyber security as a career path but might be put off entering it as it is still a male dominated profession. They may also think they lack the relevant skills and qualifications to enter the industry, but transferable experience also counts for a lot. Unfortunately, I have been subjected to bullying in the industry, and interestingly I’ve been bullied by other women in the industry, not by men. This can be soul destroying but I am determined to not let it affect me and to continue to work towards my goals. I have also observed that many trade shows and exhibitions are aimed mainly at men and aren’t very welcoming to women. For example, I attended Infosec last June for the first time in a few years. When I was walking past the exhibitor booths on the second day, I noticed that some of them were handing out bottles of beer – at 10.00am in the morning! What’s more, those serving the beer bottles were only giving them to men who were walking past the stands in question and the staff on the stands were deliberately pulling the men in to talk to them, but not women. I called this #BeerBias. Much more needs to be done to change the perception of cyber security being a male dominated profession. You have a focus on data/analytics, software, artificial intelligence and machine learning as they relate to cyber security. How are these technologies (for example AI) impacting the password security landscape? I think these technologies are making an impact but there is still a long way to go before they completely replace traditional password methods. For example,

Read More »
Interview with cybersecurity expert, author, and CEO Scott Schober.

Humans are not very good at remembering anything longer than 9 characters in length

“If our phone numbers or social security numbers were just a few digits longer, most of us would have trouble remembering them so they were designed with this in mind.” Introduction At Logmeonce, we’re focused on helping protect you against cybersecurity threats. We do this in many ways. First, we provide you with a suite of tools, including a password management tool, to help keep your passwords safe.  However, technology itself can’t solve all of our security woes (as we’ll soon discuss below). Education plays a big role in staying safe online. For this reason, from time to time, we bring in cybersecurity experts from around the world to help educate you, our blog readers, about the various ways you can protect yourself online.  Today, Logmeonce had the opportunity to chat with Scott Schober, the author of Hacked Again and President and CEO of Berkeley Varitronics Systems (BVS), a 48 year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Scott is a highly sought after author and expert for live security events, media appearances and commentary on the topics of ransomware, wireless threats, drone surveillance and hacking, cybersecurity for consumers and small business. We have an exciting interview planned for you today, so without further ado, let’s jump in!   The Interview First of all, thank you for taking the time to chat with our cybersecurity blog readers today Scott. We really appreciate it. Let’s kick off the interview by having you tell us a little bit more about what inspired you to get involved in the cybersecurity space? What was it about this niche that pulled in you and never let you go? Berkeley Varitronics Systems (BVS) is a 48 year old family business that was founded by my father, Gary Schober. We developed the first wireless test tools used to build out early cellular networks back in the mid 80s and have stayed in the wireless network space ever since. Since then, wireless cell phones have become an integral part of our modern lives. Over the past decade, modern smart phones have gained even more cameras, microphones, video and communications features all accomplished through a variety of wireless standards including 3G and 4G LTE, bluetooth and bluetooth low energy, Wi-Fi, and NFC. Just recently we’ve seen a major push towards 5G and ultra wideband technologies too. My company has developed over 200 unique wireless test and security tools so we’ve had a hand in all of these standards over the years. Since hackers and cyber criminals primarily set their sights on the weakest, easiest targets, wireless has become the natural intersection where BVS faces off with criminals. The more time I have spent this past decade educating and presenting on security, the more I have become a target of cyber criminals. My company and myself have received multiple attacks to my credit card, debit card and online accounts. My company’s online store was hit with repeated DDoS (Distributed Denial of Service) attacks. Cyber criminals stole approximately $65,000 out of our company checking account. We got all of our money back but ordeal taught me a valuable lesson. No one is 100% safe from a determined hacker, but we can all take some basic steps to keep us safe. This led me to publish my first book ‘Hacked Again’ which essentially told my story in the hopes that others could avoid the mistakes and anguish I went through. Let’s talk about your book Hacked Again. In the book you talk about many things, including but not limited to the importance of strong passwords, wireless threats, malware, ransomware and SPAM. However, in the book you also talk about about the dark web where people buy and sell login credentials. Can you tell us a little bit more about the dangers of this login credential marketplace? Where are hackers getting these login credentials to sell in the first place? How big of a market is the black market for login credentials? The dark web is the Internet’s underbelly. The average user is never on the dark web so it can be a bit intimidating. In reality, it is a much smaller part of the larger surface web we use everyday, but the dark web allows cyber criminals to buy and sell illicit products on a multi-billion dollar marketplace with a high degree of anonymity. After being victimized by cyber criminals, I learned all about markets for stolen personal information that exist all over the dark web. Taken alone, our email address or the last four digits of our social security number might not be that valuable, but when pieced together, they become a jigsaw puzzle that resembles our digital identity. Since criminals operate and communicate freely across the dark web, they often trade, buy and sell these pieces of data to each other. I have been working closely with an exciting company called Cyberlitica that provides dark web scans and alerts for users so I’ve seen the direct consequences of dark web transactions. Last year, I thought it was time to offer an all inclusive Cyber Security Survival Kit which provides cybersecurity education and alerts to its subscribers. It’s an easy way for consumers, business owners and even enterprise to simply run their daily business and stay ahead of cybercriminals without devoting too much time and resources to security. From a buyers perspective how valuable can these credentials be? What are the most common systems they are looking to access?  Due to their anonymity in the dark web, cybercriminals can wait for the highest bidder without fear of being tracked or busted by authorities. Dark web users require Tor software which is open sourced and free and enables anonymous communication whether you are a good guy or a cybercriminal. Tor was initially developed by the U.S. Navy Research Laboratory in order to protect U.S. intelligence communications so it is global network that conceals every user’s location making surveillance extremely difficult. All traffic is

Read More »

Scheduled Login to Ensure Account Access Only During Working Hours

Cybersecurity has always been an important subject. Today, it is more important than ever as we constantly see news about some major internet theft or hacks where a lot of people lost their money or personal information. Furthermore, today we have more companies using computers during their everyday work. Not only that they work on their computers, but all of their bank accounts and business data are stored on computers which means that keeping them unprotected could pose a great liability. This is why businesses are looking to protecting their IT assets as best as possible to avoid unwanted setbacks or even the complete destruction of their operations. Today, we are going to talk about Scheduled Login security protocol which helps businesses keep track of who accesses important accounts and regulates who is allowed to do it. Allow account login only when you want to In modern business, people use various cloud-based software solutions, online tools, and websites where they have accounts and where they have to log in to use them. With scheduled login protection, you can keep all of your accounts in check and protect them from any unauthorized access. Simply put, scheduled login allows you to designate the period in which you can log into a certain account. All of the accounts can be scheduled differently, according to when you usually use them. This means that you can rest assured that nobody will be able to login to your account outside of the time period that you scheduled. You will no longer have to worry if someone accessed your account while you are away from work and when you are not using it. This kind of system protects people from accessing accounts even when they are using your computer or trying to get into your account from another device. Logging in outside of scheduled times Although it is generally a good idea to calculate your logins properly so that you always want to log in during the “green” period, it will sometimes be impossible. Sometimes, you will have to log in to your accounts at unpredicted times because something is urgent or you missed something while at work. Don’t be worried, as there are a lot of customization options that you can use so that this doesn’t present a problem. When you try to log in outside of your login schedule, you will be able to do it only if you are logging in from the same IP address as your last login, and with the same device. This way, there is no further verification required. However, if you are trying to do this with some other device, you will need further verification. This can include further questions that need to be answered and that you’ve previously set. You will also get an SMS message to your phone that you or someone else is trying to log in during the “red” period. Logins can be customized individually We use various websites while at work for different reasons. In most cases, we have organized timelines in which we use certain pages. Similarly to these timelines, you should also schedule account logins. When you enable a scheduled login in LogMeOnce, you will get an additional option where you can customize login and logout options. You can setup a scheduled time and if logins are allowed. It is also possible to add tolerance periods before and after your scheduled login time. These period are just in case your schedule varies from time to time so that you don’t get into the red zone yourself. You account can be customized to the exact minute and date when you want to be able to log in next time. Additional protection features When setting up your accounts on LogMeOnce, you can adjust websites separately and enable or disable your scheduled login features. All of these things allow you to create more layers of security and make it difficult for hackers to access your accounts. They don’t know your schedules and even if they know your passwords and account usernames, it will be very difficult for them to log in. If they try to do this, you will also be informed through your mobile device. This is a great security system that allows professionals to keep tabs on all of their accounts and designate their security system to their liking. If you are in need of this kind of security, going for the scheduled login is definitely right.

Read More »

Search

Category

Protect your passwords, for FREE

How convenient can passwords be? Download LogMeOnce Password Manager for FREE now and be more secure than ever.

Copyright © 2011-2025 LogMeOnce. All rights reserved.