<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>password Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/password/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/password/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 17 Dec 2025 02:35:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>password Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/password/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Six Essential AI Safety Practices for Leaders</title>
		<link>https://fosterinstitute.com/six-essential-ai-safety-practices-for-leaders/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 02:35:38 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=6164</guid>

					<description><![CDATA[<p>Six Essential AI Safety Practices for Leaders As organizations increasingly adopt AI tools, it&#8217;s crucial to implement basic safety measures to help maintain your competitive advantage, prevent costly breaches, and preserve client trust. But there are so many considerations, where do you start? Here are six essential AI safety tips every leader should follow: 1. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/six-essential-ai-safety-practices-for-leaders/">Six Essential AI Safety Practices for Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Six Essential AI Safety Practices for Leaders</h3>
<p>As organizations increasingly adopt AI tools, it&#8217;s crucial to implement basic safety measures to help maintain your competitive advantage, prevent costly breaches, and preserve client trust. But there are so many considerations, where do you start? Here are six essential AI safety tips every leader should follow:</p>
<h3>1. Choose Which AI Tools You Will Trust with Your Data</h3>
<p>There are third-party tools that offer features such as recording and summarizing meeting notes, ingesting all your data to augment their responses, and more.</p>
<p>Review their privacy policies before you use the tools. If it states the tool and company keep your information private, but then explains they share data with third parties over whom the provider has limited control, treat the tool as having no meaningful privacy protections.</p>
<p>Sharing sensitive information such as your customers’ information, business practices, or anything else you want to protect, with third parties can be concerning, as it could go anywhere those third parties want to share it.</p>
<p>That&#8217;s why some organizations stick with the primary chatbots that are under more scrutiny. But don’t give up on the third-party tools; some of them can be very useful. Just be sure to weigh the risks of sensitive data exposure vs. the benefits.</p>
<h3>2. Clear Your Chat Histories Periodically</h3>
<p>Chat histories are very useful for going back and picking up conversations where you left off, potentially weeks or even months later. The reality is, even with a search function, it can be difficult to go back and find a specific chat when you have too many to look through.</p>
<p>The reason to remove old chats is so that a threat actor cannot read them if they break in with your login information or another way. If you don’t need the old chats, remove them.</p>
<p>Some chatbots state that they will remove your chats 30 days after you delete them. Because they can change frequently, always check the current policy for all tools.</p>
<p>Some enterprise subscriptions to chatbots permit your IT department to set policies to automatically delete all chats older than the number of days you specify.</p>
<h3>3. Disable Automatic Sharing of Meeting Notes</h3>
<p>Meeting notes are unreliable until a human edits and finalizes them.</p>
<p>If you&#8217;ve used AI at all, you&#8217;re familiar with the term hallucination. Participants in the meeting know the context of the meeting; AI must attempt to figure that out. AI tools are often designed to estimate and present the most likely meaning of conversations, even when they&#8217;re not certain.</p>
<p>If you have a meeting where people use a lot of words like &#8220;it,&#8221; &#8220;they,&#8221; &#8220;that,&#8221; &#8220;thing,&#8221; and so on, AI sometimes guesses what they mean, and it might get everything so wrong that the summary is inaccurate. Sometimes it can get the meaning in the notes that&#8217;s exactly opposite of what was really discussed.</p>
<p>A key step is to disable the automatic sharing of meeting notes after the meeting finishes. The meeting notes must always be reviewed by a human, preferably you, so you can correct any mistakes in the meeting summary before sending them out. There may be people who make decisions, important ones, based on the meeting summary. Meetings contain tasks assigned and accepted, status of decisions, and other key information, so it&#8217;s essential to confirm the accuracy of the summaries.</p>
<p>Some organizations have elected to completely omit recording meetings to protect the privacy of the meeting and prevent inaccurate summaries from leaving their organization. If they do have AI make notes, they think twice before sending them to someone outside the organization. If meeting notes or a summary contain misinformation that leaks, you have no control of information already sent.</p>
<h3>4. Anonymize Member or Client Information When You Give Information to AI</h3>
<p>For example, if you&#8217;re creating a sensitive email to someone who&#8217;s upset, you might substitute a fictitious name for the person&#8217;s real name and the organization’s name, just in case there&#8217;s an information leak. Anonymization can be very simple: just use the word &#8220;Jim&#8221; where you would normally use &#8220;Tom.&#8221; This one&#8217;s up to you, but some people sleep better at night knowing they didn&#8217;t put their customer&#8217;s actual name into the AI tool.</p>
<p>Then, after you finish tuning up your correspondence, before you send out that message or that document, you simply do a find-and-replace to restore the names of the person and the company to their correct names. And you&#8217;re doing that outside of the AI tool.</p>
<p>Many people forgo anonymization most of the time because it adds two extra steps, but they use it in special cases. Keep in mind that changing people’s and organizations’ names might still not be enough to anonymize the discussion if you enter a unique event, location, project name, or another bit of context that ties back to the actual person or organization.</p>
<h3>5. Disable the AI Model&#8217;s Training Features in the Settings</h3>
<p>The most common concern I hear from business executives is that their organization’s sensitive information will leak into the public domain. The term “training” describes a large language model learning from your chats. If you provide information such as a customer list and the training or learning is disabled, the chatbot should not remember your sensitive information or share it with another user at another company, unbeknownst to you, anywhere on the planet.</p>
<p>Most chatbots allow you to disable learning or training based on the information you enter, and sometimes the training setting is “off” by default.</p>
<p>Disabling training typically means your data is not used to improve the public AI model. There is no guarantee that data isn’t stored, reviewed by a human, or exposed through a security incident.</p>
<h3>6. Always Use Strong Passwords and Multi-Factor Authentication on All of Your AI Accounts</h3>
<p>If a stranger or other unauthorized party were able to log in to your chatbot account, they could read all your saved chats and learn a lot about you and your organization. They can craft fraudulent email messages so accurately that you or members of your team would fall for them without hesitation. Threat actors could also use your chatbot in unethical ways that would appear to be you. You could get locked out of your account for misbehavior. Another risk is that threat actors are designing tailored prompts that cause chatbots to bypass their alignment boundaries. Furthermore, attackers can use compromised chatbot accounts as a trusted pathway into systems and data. Just as you benefit from AI’s power, the attackers can use your AI’s power against you.</p>
<p>As with any website or service, use the strongest sign-in protection the chatbot supports. Using a password alone is considered insufficient authentication protection. Passwordless multi-factor authentication is usually the strongest option available and relies on your phone, fingerprint, facial recognition, a physical USB key, or another method that doesn’t require entering a password but still has more than one factor.</p>
<p>If the login doesn’t support passwordless login, using an authenticator app on your phone with number matching is sometimes the next best option.</p>
<p>If an authenticator is not available, use a text or email message as your second factor. It is far better than having no multi-factor authentication.</p>
<p>Always remember that authentication protection, no matter how advanced, is not immune to threat actors using techniques to bypass MFA. Always be wary of unexpected login prompts, as they may be attempts by a threat actor to gain access through you.</p>
<h3>Conclusion</h3>
<p>Those are some basic AI safety tips for leaders. These are all very simple to accomplish, and there&#8217;s a good chance you&#8217;re already doing most or all of them. Please forward this to your friends so that they can make sure they&#8217;re following these steps too.</p>
<h3 style="margin-bottom: 15px;">About the Author</h3>
<p style="margin-bottom: 10px;"><strong>Mike Foster, CISSP®, CISA®</strong><br />
Cybersecurity Consultant and Keynote Speaker<br />
📞 805-637-7039<br />
📧 mike@fosterinstitute.com<br />
🌐 www.fosterinstitute.com</p>
<p style="margin-bottom: 15px;">Mike Foster is a leading cybersecurity consultant with decades of experience helping organizations across North America secure their digital assets. He holds CISSP® and CISA® certifications and is the author of The Secure CEO. As the founder of The Foster Institute, Michael has delivered over 1,500 keynote presentations and consulting engagements, equipping executives and IT leaders to strengthen their cybersecurity posture and defend against evolving threats.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/six-essential-ai-safety-practices-for-leaders/">Six Essential AI Safety Practices for Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MFA Fatigue: The Hidden Danger and How to Combat It</title>
		<link>https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 28 Apr 2023 17:50:21 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5443</guid>

					<description><![CDATA[<p>Benefits you will experience with the upgrade from Chat GPT-3.5 to Chat GPT-4 include:</p>
<p>The post <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">MFA Fatigue: The Hidden Danger and How to Combat It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers notoriously figure out users’ passwords; hence, organizations and individuals must make logging in more secure.</p>
<p>Logins often go like this:<br />
1. User enters a password<br />
2. The user receives a text message with a code to confirm it is them</p>
<p>That second step is called MFA (Multi-Factor Authentication).</p>
<p>Entering numbers is frustrating, so some organizations use push notifications:<br />
1. User enters a password<br />
2. The user has an authenticator app asking, “Is that you trying to log in?” The user can click “Yes,” and they’re in. If it is an attacker, the user can ignore the alert or click “no.”</p>
<p>Attackers are overwhelmingly bypassing push notification protection. Here&#8217;s how: Once the bad guys obtain the user’s password, they make frequent attempts to log in, sending many alerts to the targeted user’s phone. The user is annoyed by the interruptions. Sometimes, users click &#8220;approve&#8221; to stop the annoyance. They don’t realize they are allowing an attacker into the system. <strong>This phenomenon is known as MFA fatigue.</strong></p>
<p>If you use push notifications, ensure that your push notifications require the user to enter at least two digits displayed on the device where they entered the password rather than simply pressing the approve button in their phone app. This verification helps prove the user has the device. The process becomes:<br />
1. The user enters a password on the device they’re logging into.<br />
2. The user has an authenticator app asking them, “What code is your device displaying?” The user enters the code, and they’re logged in.</p>
<p>Microsoft calls the process “Number Matching.” Duo calls it “Verified Duo Push.” Okta calls this a number challenge.</p>
<p>If you use push notifications, enable some form of number matching verification ASAP to combat MFA Fatigue.</p>
<p>Please tell your friends to be sure they know this hidden danger and can tighten security in their organizations.</p>
<p>The post <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">MFA Fatigue: The Hidden Danger and How to Combat It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</title>
		<link>https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 10 Sep 2018 16:07:03 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[master passwords]]></category>
		<category><![CDATA[password access]]></category>
		<category><![CDATA[password location]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[safely storing passwords]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2666</guid>

					<description><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet.</p>
<p>You assign your IT team <span id="more-2666"></span>the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT team a copy of the master key.</p>
<p>Here is where it gets crazy: Suppose that there is a well-known tradition, in all companies, for IT professionals to store their master keys in the top drawer of their desks. Unfortunately, if someone wants to steal a vehicle, they know right where to find a master key. They can take all the cars once they gain access to the master, and they know exactly where to find it.</p>
<p>In the real world, your IT team has the responsibility to secure and manage your most sensitive data. In doing so, they have the master keys that unlock all the other keys. It is a tradition to give all IT professionals, and even outside consultants, keys to the master lockbox. The shocking part is that all IT professionals are encouraged to store the master keys in the same place, in the default well-known security groups named schema, enterprise, and domain admins.</p>
<p>Your IT team must create new security groups, with different names, in which to store the master keys. It is crucial that the new groups only provide specific privileges to member users on a need to know basis. It is ok if this strategy is new to them.</p>
<p>To measure this, ask your IT professionals to show you what users are members of those default security groups. Discuss moving those users into specific groups that provide the least amount of access they need to perform their work. Depending on the complexity of your system, this may take more time. IT professionals are always busy, so discuss with them their current projects, then prioritize this essential security improvement accordingly.</p>
<p>Storing master keys in a well-known location is absurd, and it is likely that you are doing that now.</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make Life Easier &#8211; Go Back to Easy Passwords</title>
		<link>https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Sep 2017 16:09:08 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST Recommendations]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NIST passwords]]></category>
		<category><![CDATA[password length]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password suggestions]]></category>
		<category><![CDATA[pw safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2530</guid>

					<description><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Using plain letters is enough; numbers and symbols are optional. Passwords need to be long, at least 8 characters. 16 or more is better. You don’t have to reset passwords unless you suspect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier…<span id="more-2530"></span></p>
<p>Using plain letters is enough; numbers and symbols are optional.</p>
<p>Passwords need to be long, at least 8 characters. 16 or more is better.</p>
<p>You don’t have to reset passwords unless you suspect a data breach. Wow!</p>
<p>However, passwords cannot match a database of stolen or easy to guess passwords. And, your login mechanism has to have a way to verify that.</p>
<p>That’s the basic gist. You can read the details in the NIST Special Publication 800-63 at https://pages.nist dot gov/800-63-3/sp800-63-3.html It covers secret questions, two step login, etc.</p>
<p>Now, hopefully PCI and other standards will update their rules too.</p>
<p>Please forward this to anyone who is sick of complicated passwords and having to change them every 90 days.</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Online Password Warehouse, OneLogin, Discovers Massive Breach</title>
		<link>https://fosterinstitute.com/online-password-warehouse-onelogin-discovers-massive-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 21 Jun 2017 19:34:42 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Centrify]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[login information]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Okta]]></category>
		<category><![CDATA[OneLogin]]></category>
		<category><![CDATA[password managers]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[RSA]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[SalesForce App Cloud]]></category>
		<category><![CDATA[SecureID Access]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2506</guid>

					<description><![CDATA[<p>Without getting complicated, OneLogin, Okta, Centrify, Microsoft, RSA SecureID Access, SalesForce App Cloud, and even more basic password managers store user identities, and login information. Using these services means that users only need to remember one password and all of their other logins are handled for them. The most important thing about the OneLogin breach: [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/online-password-warehouse-onelogin-discovers-massive-breach/">Online Password Warehouse, OneLogin, Discovers Massive Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Without getting complicated, OneLogin, Okta, Centrify, Microsoft, RSA SecureID Access, SalesForce App Cloud, and even more basic password managers store user identities, and login information. Using these services means that users only need to remember one password and all of their other logins are handled for them.</p>
<p>The most important thing about the OneLogin breach: It affects you and everyone else, not just the 2000 customers of OneLogin.</p>
<p>If you store information in the cloud, including information your customers entrust to you, and if your cloud provider uses OneLogin internally, then your sensitive information could possibly be accessible as well. Cloud based service providers you use every day might use identity management.</p>
<p>This is another example of how someone else’s breach can hurt you, including exposing your customers’ sensitive information.</p>
<p>The big question is: How long have attackers had access? Thank goodness OneLogin at least identified that they’d been breached. Are any other identity management firms breached and don’t yet realize it? What are attackers accessing around the world using stolen passwords?</p>
<p>Please forward this to anyone you know who may not realize that these single points of failure, holding login information for many services that even your service providers may use internally, are very attractive targets for attackers. One successful attack results in a goldmine of information, including yours.</p>
<p>The post <a href="https://fosterinstitute.com/online-password-warehouse-onelogin-discovers-massive-breach/">Online Password Warehouse, OneLogin, Discovers Massive Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</title>
		<link>https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 28 Mar 2017 15:33:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LastPass Breach]]></category>
		<category><![CDATA[Password Manager Breach]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[password storage]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2456</guid>

					<description><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords. Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords.<span id="more-2456"></span></p>
<p>Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the risks can be minimized as summarized below:</p>
<p>First, as you can see, there is no guarantee that password managers are perfect. Never store super-sensitive passwords into your password manager. Store them in your head.</p>
<p>Second, enable two-step verification on all websites. Then, if an unauthorized person obtains your password, they will have a difficult time logging in, if they cannot perform the second step.</p>
<p>Third, one of the ways to launch the exploit involves tricking the user into clicking a link, such as a link in an email message, or getting a script to run on a web page as the user visits the page. Using click-to-play can greatly minimize those risks.</p>
<p>To learn more about the first two, see last week’s newsletter posted at www.fosterinstitute dot com/blog/your-iphone-and-ipad-are-in-danger. Never mind the title; the content addresses the first two steps listed above even if you use Windows or Android.</p>
<p>As for the third point, we&#8217;ll cover click-to-play next week, or you can simply google those terms and get started right away.</p>
<p>The announcement came from LastPass, and don&#8217;t panic if you use it. LastPass says the exploit is very difficult for an attacker to use, but not impossible. Resetting your passwords is not going to help, yet. Only after LastPass develops a patch, and then only when LastPass on your computers are patched. LastPass said this only affects users using the LastPass extension in Chrome, but that researchers have used the exploit in other browsers too. Email us if you want more technical details.</p>
<p>Please forward this to anyone you know who may use a password manager or lets their browsers remember their passwords.</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>No More Passwords</title>
		<link>https://fosterinstitute.com/no-more-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 24 Dec 2015 18:17:53 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Future]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Future]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two set logon]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[no passwords]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two-step logon]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2244</guid>

					<description><![CDATA[<p>How do you feel about giving up passwords entirely? You may have that option soon. You’ll enter a username, and your phone will buzz to ask you if it is really you who is attempting to log in. Just keep your phone with you, and passwords may be a thing of the past. But protect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/no-more-passwords/">No More Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How do you feel about giving up passwords entirely? You may have that option soon.<span id="more-2244"></span></p>
<p>You’ll enter a username, and your phone will buzz to ask you if it is really you who is attempting to log in. Just keep your phone with you, and passwords may be a thing of the past. </p>
<p>But protect your phone so that an unauthorized person doesn’t gain access to it. Would you be willing to risk it? At least nobody thousands of miles away would come to steal your phone. But what about someone else in your office that gains access to your phone and approves a bogus logon so they could do you harm?</p>
<p>The obvious less convenient, but more secure, solution is two-step logon where you enter a user name and password, then your phone buzzes asking you to confirm. Someone else stealing your phone won’t help them at all, as long as they don’t know your password too.</p>
<p>The post <a href="https://fosterinstitute.com/no-more-passwords/">No More Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What to Do About Your Passwords</title>
		<link>https://fosterinstitute.com/what-to-do-about-your-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 06 Aug 2014 18:55:28 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security breaches]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[security awareness training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1946</guid>

					<description><![CDATA[<p>You probably heard that a group of hackers has collected more than a billion passwords – so far. The best password strategies: It is easy to become numb about the news of stolen passwords. In the biggest discovery, so far, more than 420,000 websites have been hacked – and they are just finding out about [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-about-your-passwords/">What to Do About Your Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You probably heard that a group of hackers has collected more than a billion passwords – so far. The best password strategies:<span id="more-1946"></span></p>
<p>It is easy to become numb about the news of stolen passwords. In the biggest discovery, so far, more than 420,000 websites have been hacked – and they are just finding out about it now. What if yours is one of the 1.2 billion stolen passwords? </p>
<p>Changing passwords frequently helps – but it is an inconvenience. Today is a good time to do it anyway – especially for banking, medical, and the most important sites. </p>
<p>Password managers can help you – they remember your passwords for you so you can have a different password at every site. Therefore, you only need to remember one password, the password to your password manager. Choices abound including LastPass, DashLane, Roboform and many others. There are “enterprise” versions to use in your company, and they are inexpensive.</p>
<p>Yes, there is a tiny risk that an attacker might breach the password manager, so you may decide to keep your banking credentials in your head, but use the password manager for other sites. </p>
<p>Perhaps the best solution is “multi-factor authentication” also known as &#8220;2-step&#8221; verification. Then you may not even care if someone else knows your password. An example of this solution: You enter a username and password into a web site, and then your mobile phone buzzes and tells you to enter the code such as 777888 to complete the login process. </p>
<p>Now an attacker would need to steal your mobile phone too before they could log on with your username and password. Obviously, if the attacker is in another country, then it is more difficult for them to steal your phone.  </p>
<p>DropBox, PayPal, Google Apps, and many other sites already support multi-factor authentication – you just have to “turn it on.” See https://www.google.com/landing/2step/ to set up your Google account&#8217;s 2-step verification.</p>
<p>However, even multi-factor solutions are not perfect. One example, among many others, is how it was possible to bypass PayPal’s multi-factor authentication if you logged into EBay first.</p>
<p>By the way, in case you have eaten there, P.F. Chang’s published a list of restaurant locations that may have been breached: <a href="http://pfchangs.com/security/#locations">http://pfchangs.com/security/#locations</a></p>
<p>Change your passwords, get a password manager if you want to, and inquire about multi-factor authentication at the websites that contain your sensitive data. </p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-about-your-passwords/">What to Do About Your Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives – Passwords Cause Very Bad Days</title>
		<link>https://fosterinstitute.com/executives-passwords-cause-very-bad-days/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 20 May 2014 16:04:02 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[administrative password]]></category>
		<category><![CDATA[default password]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1919</guid>

					<description><![CDATA[<p>Sitting next to me on the plane today was a member of Oracle’s Security Team. I asked what was the one single best bit of security advice Oracle could give to their customers. “Change your default passwords.” A few weeks ago, I met with a CEO who had lost half-a-million dollars (so far) because his [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-passwords-cause-very-bad-days/">Executives – Passwords Cause Very Bad Days</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Sitting next to me on the plane today was a member of Oracle’s Security Team. I asked what was the one single best bit of security advice Oracle could give to their customers. “Change  your default passwords.”  A few weeks ago, I met with a CEO who had lost half-a-million dollars (so far) because his IT pro had set a password in their main application to the exact name of his company. Of course, the CEO had no idea that the password was so basic.<span id="more-1919"></span></p>
<p>Before it is too late, contact your IT Professionals, be they in-house or outsourced, and ask them to show you the administrative passwords to your network, the admin passwords to your databases, the password to all of your applications, and any other passwords that provide access to anything you wouldn’t want an attacker accessing.  (It is often best “not to know” each user’s passwords – this is about the administrative passwords).</p>
<p>Remember IT Pros are very busy people and often juggling many projects. It is easy for something, like a default or guessable password, to “slip through the cracks.”  </p>
<p>Just your asking will incentivize IT to be sure the passwords are all at least 14 characters long and make no sense at all.  Even better if they use multi-factor authentication – more on that later.</p>
<p>Ask them now. And don’t let them email you the list.</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/executives-passwords-cause-very-bad-days/">Executives – Passwords Cause Very Bad Days</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
