<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>password safety Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/password-safety/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/password-safety/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 12 Jun 2022 01:40:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>password safety Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/password-safety/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</title>
		<link>https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 10 Sep 2018 16:07:03 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[master passwords]]></category>
		<category><![CDATA[password access]]></category>
		<category><![CDATA[password location]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[safely storing passwords]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2666</guid>

					<description><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet.</p>
<p>You assign your IT team <span id="more-2666"></span>the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT team a copy of the master key.</p>
<p>Here is where it gets crazy: Suppose that there is a well-known tradition, in all companies, for IT professionals to store their master keys in the top drawer of their desks. Unfortunately, if someone wants to steal a vehicle, they know right where to find a master key. They can take all the cars once they gain access to the master, and they know exactly where to find it.</p>
<p>In the real world, your IT team has the responsibility to secure and manage your most sensitive data. In doing so, they have the master keys that unlock all the other keys. It is a tradition to give all IT professionals, and even outside consultants, keys to the master lockbox. The shocking part is that all IT professionals are encouraged to store the master keys in the same place, in the default well-known security groups named schema, enterprise, and domain admins.</p>
<p>Your IT team must create new security groups, with different names, in which to store the master keys. It is crucial that the new groups only provide specific privileges to member users on a need to know basis. It is ok if this strategy is new to them.</p>
<p>To measure this, ask your IT professionals to show you what users are members of those default security groups. Discuss moving those users into specific groups that provide the least amount of access they need to perform their work. Depending on the complexity of your system, this may take more time. IT professionals are always busy, so discuss with them their current projects, then prioritize this essential security improvement accordingly.</p>
<p>Storing master keys in a well-known location is absurd, and it is likely that you are doing that now.</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make Life Easier &#8211; Go Back to Easy Passwords</title>
		<link>https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Sep 2017 16:09:08 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST Recommendations]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NIST passwords]]></category>
		<category><![CDATA[password length]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password suggestions]]></category>
		<category><![CDATA[pw safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2530</guid>

					<description><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Using plain letters is enough; numbers and symbols are optional. Passwords need to be long, at least 8 characters. 16 or more is better. You don’t have to reset passwords unless you suspect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier…<span id="more-2530"></span></p>
<p>Using plain letters is enough; numbers and symbols are optional.</p>
<p>Passwords need to be long, at least 8 characters. 16 or more is better.</p>
<p>You don’t have to reset passwords unless you suspect a data breach. Wow!</p>
<p>However, passwords cannot match a database of stolen or easy to guess passwords. And, your login mechanism has to have a way to verify that.</p>
<p>That’s the basic gist. You can read the details in the NIST Special Publication 800-63 at https://pages.nist dot gov/800-63-3/sp800-63-3.html It covers secret questions, two step login, etc.</p>
<p>Now, hopefully PCI and other standards will update their rules too.</p>
<p>Please forward this to anyone who is sick of complicated passwords and having to change them every 90 days.</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</title>
		<link>https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 28 Mar 2017 15:33:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LastPass Breach]]></category>
		<category><![CDATA[Password Manager Breach]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[password storage]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2456</guid>

					<description><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords. Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords.<span id="more-2456"></span></p>
<p>Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the risks can be minimized as summarized below:</p>
<p>First, as you can see, there is no guarantee that password managers are perfect. Never store super-sensitive passwords into your password manager. Store them in your head.</p>
<p>Second, enable two-step verification on all websites. Then, if an unauthorized person obtains your password, they will have a difficult time logging in, if they cannot perform the second step.</p>
<p>Third, one of the ways to launch the exploit involves tricking the user into clicking a link, such as a link in an email message, or getting a script to run on a web page as the user visits the page. Using click-to-play can greatly minimize those risks.</p>
<p>To learn more about the first two, see last week’s newsletter posted at www.fosterinstitute dot com/blog/your-iphone-and-ipad-are-in-danger. Never mind the title; the content addresses the first two steps listed above even if you use Windows or Android.</p>
<p>As for the third point, we&#8217;ll cover click-to-play next week, or you can simply google those terms and get started right away.</p>
<p>The announcement came from LastPass, and don&#8217;t panic if you use it. LastPass says the exploit is very difficult for an attacker to use, but not impossible. Resetting your passwords is not going to help, yet. Only after LastPass develops a patch, and then only when LastPass on your computers are patched. LastPass said this only affects users using the LastPass extension in Chrome, but that researchers have used the exploit in other browsers too. Email us if you want more technical details.</p>
<p>Please forward this to anyone you know who may use a password manager or lets their browsers remember their passwords.</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why is it not Google&#8217;s fault?</title>
		<link>https://fosterinstitute.com/why-is-it-not-googles-fault/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 12 May 2016 13:00:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two set logon]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[dark-web]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security blame]]></category>
		<category><![CDATA[stolen passwords]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two factor auth]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2316</guid>

					<description><![CDATA[<p>After last week&#8217;s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn&#8217;t Google&#8217;s fault that the passwords were stolen. I know &#8211; it would be so easy to blame Google. Those passwords were gathered from other “stolen password repositories” posted on the dark-web. They were [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/why-is-it-not-googles-fault/">Why is it not Google&#8217;s fault?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After last week&#8217;s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn&#8217;t Google&#8217;s fault that the passwords were stolen. <span id="more-2316"></span></p>
<p>I know &#8211; it would be so easy to blame Google. Those passwords were gathered from other “stolen password repositories” posted on the dark-web. They were originally acquired through key-loggers, social engineering, brute-force attacks, and a myriad of other ways. None of them, so far as anyone can tell, were stolen by bypassing any security on Google’s systems.</p>
<p>Once upon a time, imagine a situation where a company called Eulcon Inc. buys a lock from a company named Good-Lock. If an employee at Eulcon Inc. loses the key, and an attacker finds the key, and the attacker breaks into Eulcon, should they blame Good-Lock for the intrusion?</p>
<p>Here is what would be much more secure. What if, every time someone turned the key in the lock at Eulcon, the lock wouldn&#8217;t open yet. First, someone at Good-Lock would phone the person at Eulcon to whom the key is registered, in order to verify that they are the person who turned the key. The lock would only open for an authorized person. Potential intruders stay locked out. </p>
<p>This is why it is so important that all organizations set up two step login everywhere possible. Two factor auth dot org provides a list of services that support two step login. Additionally, VPNs, Windows, and other services support two step login. Configure two step login, or pay the consequences. And don&#8217;t blame Good-Lock. And don&#8217;t be like Eulcon spelled backwards.</p>
<p>Please forward this cyber-security info to everyone you care about.</p>
<p>The post <a href="https://fosterinstitute.com/why-is-it-not-googles-fault/">Why is it not Google&#8217;s fault?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gmail Passwords Stolen, Possibly Millions of Them</title>
		<link>https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 06 May 2016 13:00:32 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[added security password security]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[gmail security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two factor auth]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2314</guid>

					<description><![CDATA[<p>This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable two step login. Then it is very [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/">Gmail Passwords Stolen, Possibly Millions of Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable <span id="more-2314"></span>two step login. Then it is very unlikely that an attacker can compromise your account,  even if they discover your username and password.</p>
<p>Visit two factor auth dot org (no spaces) for a list of services that already permit you to choose two step login. Each site will walk you through the process.</p>
<p>Google calls their service 2 step verification. Google that phrase to find instructions on Google’s site.</p>
<p>Forward this to everyone who you care about so that they can be more cyber-secure too.</p>
<p>The post <a href="https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/">Gmail Passwords Stolen, Possibly Millions of Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anatomy of a Password Attack</title>
		<link>https://fosterinstitute.com/guesses/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 31 Mar 2016 13:00:40 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[business passwords]]></category>
		<category><![CDATA[Business Security]]></category>
		<category><![CDATA[company attacks]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Failed Logon]]></category>
		<category><![CDATA[failed logon attempts]]></category>
		<category><![CDATA[Guessing Passwords]]></category>
		<category><![CDATA[Guessing Usernames]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Lockout policy]]></category>
		<category><![CDATA[monitoring logons]]></category>
		<category><![CDATA[password attack]]></category>
		<category><![CDATA[password attacks]]></category>
		<category><![CDATA[Password lockout]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password tries]]></category>
		<category><![CDATA[PW Tries]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[username tries]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2279</guid>

					<description><![CDATA[<p>Password attacks against businesses happen all the time. You may find it interesting to see the list of usernames that attackers guess are on your system, and how many passwords they try for each username. Notice that, for the usernames most likely to exist on computers, the attacker tries more password guesses: 1398 different passwords [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/guesses/">Anatomy of a Password Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password attacks against businesses happen all the time. You may find it interesting to see the list of usernames that attackers guess are on your system, and how many passwords they try for each username.<span id="more-2279"></span></p>
<p>Notice that, for the usernames most likely to exist on computers, the attacker tries more password guesses:</p>
<p>1398 different passwords attempted with this guessed username: Administrator<br />
836 different passwords attempted with this guessed username: Admin<br />
554 different passwords attempted with this guessed username: user<br />
314 different passwords attempted with this guessed username: test<br />
314 different passwords attempted with this guessed username: user1<br />
160 different passwords attempted with this guessed username: user2<br />
156 different passwords attempted with this guessed username: user3<br />
156 different passwords attempted with this guessed username: admin1<br />
155 different passwords attempted with this guessed username: test1<br />
111 different passwords attempted with this guessed username: guest<br />
91 different passwords attempted with this guessed username: sql<br />
89 different passwords attempted with this guessed username: aspnet<br />
87 different passwords attempted with this guessed username: support_388945a0<br />
84 different passwords attempted with this guessed username: david<br />
83 different passwords attempted with this guessed username: root<br />
82 different passwords attempted with this guessed username: backup<br />
80 different passwords attempted with this guessed username: sys<br />
80 different passwords attempted with this guessed username: support<br />
80 different passwords attempted with this guessed username: Other<br />
80 different passwords attempted with this guessed username: a<br />
78 different passwords attempted with this guessed username: test2<br />
78 different passwords attempted with this guessed username: server<br />
78 different passwords attempted with this guessed username: 1<br />
78 different passwords attempted with this guessed username: john<br />
78 different passwords attempted with this guessed username: test3<br />
78 different passwords attempted with this guessed username: console<br />
78 different passwords attempted with this guessed username: owner<br />
78 different passwords attempted with this guessed username: actuser<br />
78 different passwords attempted with this guessed username: 123<br />
78 different passwords attempted with this guessed username: adm<br />
78 different passwords attempted with this guessed username: admin2<br />
78 different passwords attempted with this guessed username: user4<br />
78 different passwords attempted with this guessed username: user5<br />
32 different passwords attempted with this guessed username: surferquest<br />
18 different passwords attempted with this guessed username: auditor<br />
15 different passwords attempted with this guessed username: alilong<br />
14 different passwords attempted with this guessed username: SCOTT<br />
13 different passwords attempted with this guessed username: chirotouch<br />
13 different passwords attempted with this guessed username: PEGGY<br />
12 different passwords attempted with this guessed username: follow<br />
12 different passwords attempted with this guessed username: CHERYL<br />
12 different passwords attempted with this guessed username: TERRI<br />
11 different passwords attempted with this guessed username: ETB User<br />
10 different passwords attempted with this guessed username: system_backupDB<br />
10 different passwords attempted with this guessed username: QBPOSDBSrvUser<br />
10 different passwords attempted with this guessed username: xuhai<br />
10 different passwords attempted with this guessed username: tu<br />
9 different passwords attempted with this guessed username: mroot<br />
9 different passwords attempted with this guessed username: manager<br />
9 different passwords attempted with this guessed username: justin<br />
8 different passwords attempted with this guessed username: iis<br />
8 different passwords attempted with this guessed username: Linux<br />
7 different passwords attempted with this guessed username: acs<br />
7 different passwords attempted with this guessed username: vetvault<br />
7 different passwords attempted with this guessed username: squirrel<br />
7 different passwords attempted with this guessed username: user01<br />
7 different passwords attempted with this guessed username: crsuser<br />
6 different passwords attempted with this guessed username: saleslan<br />
6 different passwords attempted with this guessed username: IUSR_SOR<br />
6 different passwords attempted with this guessed username: scan<br />
6 different passwords attempted with this guessed username: expedite<br />
6 different passwords attempted with this guessed username: DSNVSUser<br />
6 different passwords attempted with this guessed username: reception<br />
6 different passwords attempted with this guessed username: hei<br />
6 different passwords attempted with this guessed username: VNIAdmin_DoNotDelete<br />
6 different passwords attempted with this guessed username: kaypro<br />
6 different passwords attempted with this guessed username: payroll<br />
6 different passwords attempted with this guessed username: mark<br />
6 different passwords attempted with this guessed username: alex<br />
6 different passwords attempted with this guessed username: linhai<br />
6 different passwords attempted with this guessed username: ntsec_admin<br />
6 different passwords attempted with this guessed username: lisa<br />
6 different passwords attempted with this guessed username: oprrs<br />
6 different passwords attempted with this guessed username: monster<br />
5 different passwords attempted with this guessed username: Acsadmin<br />
5 different passwords attempted with this guessed username: cli<br />
5 different passwords attempted with this guessed username: awesen<br />
5 different passwords attempted with this guessed username: aloha<br />
5 different passwords attempted with this guessed username: micrologic<br />
5 different passwords attempted with this guessed username: scanner<br />
5 different passwords attempted with this guessed username: swentz<br />
5 different passwords attempted with this guessed username: jacob<br />
5 different passwords attempted with this guessed username: jordan<br />
5 different passwords attempted with this guessed username: backoffice<br />
5 different passwords attempted with this guessed username: amiga<br />
5 different passwords attempted with this guessed username: pos<br />
4 different passwords attempted with this guessed username: warehouse<br />
4 different passwords attempted with this guessed username: rdspos<br />
4 different passwords attempted with this guessed username: linda<br />
4 different passwords attempted with this guessed username: copier<br />
4 different passwords attempted with this guessed username: rds<br />
4 different passwords attempted with this guessed username: acasey<br />
4 different passwords attempted with this guessed username: mary<br />
4 different passwords attempted with this guessed username: sapsupport<br />
4 different passwords attempted with this guessed username: Post6<br />
4 different passwords attempted with this guessed username: james<br />
4 different passwords attempted with this guessed username: micros<br />
4 different passwords attempted with this guessed username: spppse<br />
4 different passwords attempted with this guessed username: possvr<br />
4 different passwords attempted with this guessed username: apple_terminal<br />
3 different passwords attempted with this guessed username: shipping<br />
3 different passwords attempted with this guessed username: manw<br />
3 different passwords attempted with this guessed username: MssqlUser<br />
3 different passwords attempted with this guessed username: miass<br />
3 different passwords attempted with this guessed username: receptionist<br />
3 different passwords attempted with this guessed username: grace<br />
3 different passwords attempted with this guessed username: iusr_qa<br />
3 different passwords attempted with this guessed username: hk<br />
3 different passwords attempted with this guessed username: fax<br />
3 different passwords attempted with this guessed username: menw<br />
3 different passwords attempted with this guessed username: sales<br />
3 different passwords attempted with this guessed username: parts<br />
3 different passwords attempted with this guessed username: Tsmotw<br />
3 different passwords attempted with this guessed username: svc-netmon<br />
3 different passwords attempted with this guessed username: staff<br />
3 different passwords attempted with this guessed username: adminsc5<br />
3 different passwords attempted with this guessed username: ssyyet<br />
3 different passwords attempted with this guessed username: sysadmin<br />
3 different passwords attempted with this guessed username: ashley<br />
3 different passwords attempted with this guessed username: araxi<br />
3 different passwords attempted with this guessed username: ccdrs<br />
3 different passwords attempted with this guessed username: ava<br />
3 different passwords attempted with this guessed username: Cat<br />
3 different passwords attempted with this guessed username: Spectra<br />
3 different passwords attempted with this guessed username: tech<br />
3 different passwords attempted with this guessed username: voicemail<br />
3 different passwords attempted with this guessed username: adm1n<br />
3 different passwords attempted with this guessed username: terry<br />
3 different passwords attempted with this guessed username: Administrador<br />
2 different passwords attempted with this guessed username: laptop<br />
2 different passwords attempted with this guessed username: lab<br />
2 different passwords attempted with this guessed username: Astsm<br />
2 different passwords attempted with this guessed username: larry<br />
2 different passwords attempted with this guessed username: lee<br />
2 different passwords attempted with this guessed username: billing<br />
2 different passwords attempted with this guessed username: besadmin<br />
2 different passwords attempted with this guessed username: bill<br />
2 different passwords attempted with this guessed username: joshua<br />
2 different passwords attempted with this guessed username: kathy<br />
2 different passwords attempted with this guessed username: avery<br />
2 different passwords attempted with this guessed username: beadmin<br />
2 different passwords attempted with this guessed username: Kantech<br />
2 different passwords attempted with this guessed username: keith<br />
2 different passwords attempted with this guessed username: kiosk<br />
2 different passwords attempted with this guessed username: aubrey<br />
2 different passwords attempted with this guessed username: joseph<br />
2 different passwords attempted with this guessed username: benjamin<br />
2 different passwords attempted with this guessed username: lewis<br />
2 different passwords attempted with this guessed username: alan<br />
2 different passwords attempted with this guessed username: aiden<br />
2 different passwords attempted with this guessed username: addison<br />
2 different passwords attempted with this guessed username: lvellman<br />
2 different passwords attempted with this guessed username: madison<br />
2 different passwords attempted with this guessed username: manger<br />
2 different passwords attempted with this guessed username: accountant<br />
2 different passwords attempted with this guessed username: mia<br />
2 different passwords attempted with this guessed username: abigail<br />
2 different passwords attempted with this guessed username: mason<br />
2 different passwords attempted with this guessed username: matthew<br />
2 different passwords attempted with this guessed username: adam<br />
2 different passwords attempted with this guessed username: angela<br />
2 different passwords attempted with this guessed username: andrew<br />
2 different passwords attempted with this guessed username: andrea<br />
2 different passwords attempted with this guessed username: liam<br />
2 different passwords attempted with this guessed username: anthony<br />
2 different passwords attempted with this guessed username: lillian<br />
2 different passwords attempted with this guessed username: logmeinremoteuser<br />
2 different passwords attempted with this guessed username: lori<br />
2 different passwords attempted with this guessed username: lucas<br />
2 different passwords attempted with this guessed username: amelia<br />
2 different passwords attempted with this guessed username: alexander<br />
2 different passwords attempted with this guessed username: logan<br />
2 different passwords attempted with this guessed username: joe<br />
2 different passwords attempted with this guessed username: cindy<br />
2 different passwords attempted with this guessed username: chris<br />
2 different passwords attempted with this guessed username: chloe<br />
2 different passwords attempted with this guessed username: CorpOwner<br />
2 different passwords attempted with this guessed username: evelyn<br />
2 different passwords attempted with this guessed username: consult<br />
2 different passwords attempted with this guessed username: front<br />
2 different passwords attempted with this guessed username: frontdesk<br />
2 different passwords attempted with this guessed username: gabriel<br />
2 different passwords attempted with this guessed username: checkout<br />
2 different passwords attempted with this guessed username: FranOwner<br />
2 different passwords attempted with this guessed username: checkin<br />
2 different passwords attempted with this guessed username: ethan<br />
2 different passwords attempted with this guessed username: elijah<br />
2 different passwords attempted with this guessed username: elizabeth<br />
2 different passwords attempted with this guessed username: ella<br />
2 different passwords attempted with this guessed username: doctor<br />
2 different passwords attempted with this guessed username: don<br />
2 different passwords attempted with this guessed username: donna<br />
2 different passwords attempted with this guessed username: dennis<br />
2 different passwords attempted with this guessed username: daniel<br />
2 different passwords attempted with this guessed username: cs13368<br />
2 different passwords attempted with this guessed username: emily<br />
2 different passwords attempted with this guessed username: emma<br />
2 different passwords attempted with this guessed username: eric<br />
2 different passwords attempted with this guessed username: general<br />
2 different passwords attempted with this guessed username: bruce<br />
2 different passwords attempted with this guessed username: jack<br />
2 different passwords attempted with this guessed username: jackson<br />
2 different passwords attempted with this guessed username: buexec<br />
2 different passwords attempted with this guessed username: isabella<br />
2 different passwords attempted with this guessed username: bruno<br />
2 different passwords attempted with this guessed username: bkupexec<br />
2 different passwords attempted with this guessed username: jerry<br />
2 different passwords attempted with this guessed username: jim<br />
2 different passwords attempted with this guessed username: brian<br />
2 different passwords attempted with this guessed username: jayden<br />
2 different passwords attempted with this guessed username: jeff<br />
2 different passwords attempted with this guessed username: intern<br />
2 different passwords attempted with this guessed username: harper<br />
2 different passwords attempted with this guessed username: charlie<br />
2 different passwords attempted with this guessed username: chad<br />
2 different passwords attempted with this guessed username: glenn<br />
2 different passwords attempted with this guessed username: charlotte<br />
2 different passwords attempted with this guessed username: grocery<br />
2 different passwords attempted with this guessed username: canon<br />
2 different passwords attempted with this guessed username: info<br />
2 different passwords attempted with this guessed username: install<br />
2 different passwords attempted with this guessed username: celerant<br />
2 different passwords attempted with this guessed username: henry<br />
2 different passwords attempted with this guessed username: carlos<br />
2 different passwords attempted with this guessed username: remote<br />
2 different passwords attempted with this guessed username: tim<br />
2 different passwords attempted with this guessed username: tom<br />
2 different passwords attempted with this guessed username: Ray<br />
2 different passwords attempted with this guessed username: robert<br />
2 different passwords attempted with this guessed username: roger<br />
2 different passwords attempted with this guessed username: RETAIL<br />
2 different passwords attempted with this guessed username: ricoh<br />
2 different passwords attempted with this guessed username: Post4<br />
2 different passwords attempted with this guessed username: Post7<br />
2 different passwords attempted with this guessed username: trish<br />
2 different passwords attempted with this guessed username: peter<br />
2 different passwords attempted with this guessed username: production<br />
2 different passwords attempted with this guessed username: tony<br />
2 different passwords attempted with this guessed username: toshiba<br />
2 different passwords attempted with this guessed username: tool<br />
2 different passwords attempted with this guessed username: sophia<br />
2 different passwords attempted with this guessed username: sqladmin<br />
2 different passwords attempted with this guessed username: Tech01<br />
2 different passwords attempted with this guessed username: sofia<br />
2 different passwords attempted with this guessed username: steve<br />
2 different passwords attempted with this guessed username: symantec<br />
2 different passwords attempted with this guessed username: stanley<br />
2 different passwords attempted with this guessed username: t1<br />
2 different passwords attempted with this guessed username: samuel<br />
2 different passwords attempted with this guessed username: scans<br />
2 different passwords attempted with this guessed username: terasoma<br />
2 different passwords attempted with this guessed username: temp<br />
2 different passwords attempted with this guessed username: Silverx<br />
2 different passwords attempted with this guessed username: skaner<br />
2 different passwords attempted with this guessed username: security<br />
2 different passwords attempted with this guessed username: shop<br />
2 different passwords attempted with this guessed username: operator<br />
2 different passwords attempted with this guessed username: olivia<br />
2 different passwords attempted with this guessed username: natalie<br />
2 different passwords attempted with this guessed username: zoey<br />
2 different passwords attempted with this guessed username: mike<br />
2 different passwords attempted with this guessed username: william<br />
2 different passwords attempted with this guessed username: ospite<br />
2 different passwords attempted with this guessed username: office<br />
2 different passwords attempted with this guessed username: veronica<br />
2 different passwords attempted with this guessed username: vismail<br />
2 different passwords attempted with this guessed username: victoria<br />
2 different passwords attempted with this guessed username: noah<br />
2 different passwords attempted with this guessed username: ncrm<br />
2 different passwords attempted with this guessed username: wand<br />
2 different passwords attempted with this guessed username: nss256wendys<br />
2 different passwords attempted with this guessed username: michael<br />
2 different passwords attempted with this guessed username: microssvc<br />
2 different passwords attempted with this guessed username: visitor<br />
2 different passwords attempted with this guessed username: xerox<br />
1 different passwords attempted with this guessed username: template<br />
1 different passwords attempted with this guessed username: cia<br />
1 different passwords attempted with this guessed username: cihan<br />
1 different passwords attempted with this guessed username: cayetano<br />
1 different passwords attempted with this guessed username: muhasebe<br />
1 different passwords attempted with this guessed username: bruno1234<br />
1 different passwords attempted with this guessed username: comercial<br />
1 different passwords attempted with this guessed username: susan<br />
1 different passwords attempted with this guessed username: vrfy<br />
1 different passwords attempted with this guessed username: camilie<br />
1 different passwords attempted with this guessed username: teresa<br />
1 different passwords attempted with this guessed username: telnet<br />
1 different passwords attempted with this guessed username: ted<br />
1 different passwords attempted with this guessed username: tape<br />
1 different passwords attempted with this guessed username: washington<br />
1 different passwords attempted with this guessed username: web<br />
1 different passwords attempted with this guessed username: taylor<br />
1 different passwords attempted with this guessed username: tcp<br />
1 different passwords attempted with this guessed username: tarragona<br />
1 different passwords attempted with this guessed username: tanya<br />
1 different passwords attempted with this guessed username: teds<br />
1 different passwords attempted with this guessed username: acct1<br />
1 different passwords attempted with this guessed username: t12010<br />
1 different passwords attempted with this guessed username: tammy<br />
1 different passwords attempted with this guessed username: www<br />
1 different passwords attempted with this guessed username: ceyda<br />
1 different passwords attempted with this guessed username: accounting<br />
1 different passwords attempted with this guessed username: training<br />
1 different passwords attempted with this guessed username: tracy<br />
1 different passwords attempted with this guessed username: travis<br />
1 different passwords attempted with this guessed username: transition<br />
1 different passwords attempted with this guessed username: vance<br />
1 different passwords attempted with this guessed username: tracey<br />
1 different passwords attempted with this guessed username: appservadmin<br />
1 different passwords attempted with this guessed username: appismo<br />
1 different passwords attempted with this guessed username: vanschoor<br />
1 different passwords attempted with this guessed username: trent<br />
1 different passwords attempted with this guessed username: user02<br />
1 different passwords attempted with this guessed username: tsadmin<br />
1 different passwords attempted with this guessed username: user8<br />
1 different passwords attempted with this guessed username: user7<br />
1 different passwords attempted with this guessed username: truck<br />
1 different passwords attempted with this guessed username: tricia<br />
1 different passwords attempted with this guessed username: uwe<br />
1 different passwords attempted with this guessed username: troisi<br />
1 different passwords attempted with this guessed username: uucp<br />
1 different passwords attempted with this guessed username: timc<br />
1 different passwords attempted with this guessed username: thomas<br />
1 different passwords attempted with this guessed username: timeclock<br />
1 different passwords attempted with this guessed username: beer<br />
1 different passwords attempted with this guessed username: therese<br />
1 different passwords attempted with this guessed username: term<br />
1 different passwords attempted with this guessed username: teri<br />
1 different passwords attempted with this guessed username: theresa<br />
1 different passwords attempted with this guessed username: texas<br />
1 different passwords attempted with this guessed username: backupexec<br />
1 different passwords attempted with this guessed username: vcs<br />
1 different passwords attempted with this guessed username: toni<br />
1 different passwords attempted with this guessed username: vargas<br />
1 different passwords attempted with this guessed username: tonya<br />
1 different passwords attempted with this guessed username: tommy<br />
1 different passwords attempted with this guessed username: timothy<br />
1 different passwords attempted with this guessed username: timeclock mails<br />
1 different passwords attempted with this guessed username: todd<br />
1 different passwords attempted with this guessed username: tina<br />
1 different passwords attempted with this guessed username: perl<br />
1 different passwords attempted with this guessed username: pentagon<br />
1 different passwords attempted with this guessed username: piotr<br />
1 different passwords attempted with this guessed username: Post2<br />
1 different passwords attempted with this guessed username: Post1<br />
1 different passwords attempted with this guessed username: paul1234<br />
1 different passwords attempted with this guessed username: kevin<br />
1 different passwords attempted with this guessed username: pcadmin<br />
1 different passwords attempted with this guessed username: karen<br />
1 different passwords attempted with this guessed username: pdf<br />
1 different passwords attempted with this guessed username: posuser<br />
1 different passwords attempted with this guessed username: postmaster<br />
1 different passwords attempted with this guessed username: prepress<br />
1 different passwords attempted with this guessed username: program<br />
1 different passwords attempted with this guessed username: IUSR_SERVER<br />
1 different passwords attempted with this guessed username: jimmy<br />
1 different passwords attempted with this guessed username: Post3<br />
1 different passwords attempted with this guessed username: Post5<br />
1 different passwords attempted with this guessed username: poste2<br />
1 different passwords attempted with this guessed username: Post8<br />
1 different passwords attempted with this guessed username: paul<br />
1 different passwords attempted with this guessed username: myhost<br />
1 different passwords attempted with this guessed username: nasa<br />
1 different passwords attempted with this guessed username: love<br />
1 different passwords attempted with this guessed username: neil<br />
1 different passwords attempted with this guessed username: micros1<br />
1 different passwords attempted with this guessed username: michelle<br />
1 different passwords attempted with this guessed username: miguel<br />
1 different passwords attempted with this guessed username: marco<br />
1 different passwords attempted with this guessed username: mode<br />
1 different passwords attempted with this guessed username: parking<br />
1 different passwords attempted with this guessed username: ospite1234<br />
1 different passwords attempted with this guessed username: patrizia<br />
1 different passwords attempted with this guessed username: kubik<br />
1 different passwords attempted with this guessed username: patrizia2<br />
1 different passwords attempted with this guessed username: lorenzo<br />
1 different passwords attempted with this guessed username: netsis<br />
1 different passwords attempted with this guessed username: network<br />
1 different passwords attempted with this guessed username: orders<br />
1 different passwords attempted with this guessed username: new<br />
1 different passwords attempted with this guessed username: publish<br />
1 different passwords attempted with this guessed username: socket<br />
1 different passwords attempted with this guessed username: SmokinPremiums<br />
1 different passwords attempted with this guessed username: solaris<br />
1 different passwords attempted with this guessed username: documents<br />
1 different passwords attempted with this guessed username: domain<br />
1 different passwords attempted with this guessed username: scan123<br />
1 different passwords attempted with this guessed username: expn<br />
1 different passwords attempted with this guessed username: evan<br />
1 different passwords attempted with this guessed username: silver<br />
1 different passwords attempted with this guessed username: esmtp<br />
1 different passwords attempted with this guessed username: station4<br />
1 different passwords attempted with this guessed username: cscadmin<br />
1 different passwords attempted with this guessed username: sue<br />
1 different passwords attempted with this guessed username: supervisor<br />
1 different passwords attempted with this guessed username: contract<br />
1 different passwords attempted with this guessed username: spiceworks<br />
1 different passwords attempted with this guessed username: soss<br />
1 different passwords attempted with this guessed username: daniela<br />
1 different passwords attempted with this guessed username: csi<br />
1 different passwords attempted with this guessed username: SQLAgentCmdExec<br />
1 different passwords attempted with this guessed username: salesman<br />
1 different passwords attempted with this guessed username: reguser<br />
1 different passwords attempted with this guessed username: rcpt<br />
1 different passwords attempted with this guessed username: relay<br />
1 different passwords attempted with this guessed username: guard<br />
1 different passwords attempted with this guessed username: halt<br />
1 different passwords attempted with this guessed username: qwerty<br />
1 different passwords attempted with this guessed username: query<br />
1 different passwords attempted with this guessed username: rad<br />
1 different passwords attempted with this guessed username: radiant<br />
1 different passwords attempted with this guessed username: IME_ADMIN<br />
1 different passwords attempted with this guessed username: rupert<br />
1 different passwords attempted with this guessed username: fuji1<br />
1 different passwords attempted with this guessed username: FPUPDENGUSR<br />
1 different passwords attempted with this guessed username: fbi<br />
1 different passwords attempted with this guessed username: sales2<br />
1 different passwords attempted with this guessed username: report<br />
1 different passwords attempted with this guessed username: renteria<br />
1 different passwords attempted with this guessed username: good<br />
1 different passwords attempted with this guessed username: gans<br />
1 different passwords attempted with this guessed username: richard</p>
<p>The post <a href="https://fosterinstitute.com/guesses/">Anatomy of a Password Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>LastPass Password Manager Hacked</title>
		<link>https://fosterinstitute.com/lastpass-password-manager-hacked/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 16 Jun 2015 14:40:01 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[LastPass Breach]]></category>
		<category><![CDATA[LastPast password manager hacked]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[stolen passwords]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[two-step]]></category>
		<category><![CDATA[two-step authentication]]></category>
		<category><![CDATA[two-step logon]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2105</guid>

					<description><![CDATA[<p>LastPass password manager announced that they were hacked. That means that attackers might be able to find out all of your passwords. Do this immediately: Change your LastPass password.  If you use any password manager, LastPass or otherwise, two of the most important steps to take include: First, never put your most sensitive passwords into [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/lastpass-password-manager-hacked/">LastPass Password Manager Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>LastPass password manager announced that they were hacked. That means that attackers might be able to find out all of your passwords. Do this immediately: Change your LastPass password.  If you use any password manager, LastPass or otherwise, two of the most important steps to take include:<span id="more-2105"></span></p>
<p>First, never put your most sensitive passwords into any password manager. That means passwords to your banks, online trading accounts, and any other websites that aren’t worth exposing to any increased risk. More information here: <a href="https://fosterinstitute.com/blog//passwords-are-difficult-to-remember/">Passwords are Difficult to Remember</a></p>
<p>Second, always enable the two-step login process on your password manager. An example of this solution: You enter a username and password into a website, and then your mobile phone buzzes and tells you to enter the code such as 777888 to complete the login process. That way, even if an attacker learns your password, they will need to have the device you are using for two-step login. In this example, an attacker would likely need to steal your mobile phone too before they could log on, even if they know your username and password. Unless someone in close proximity to you is a member of the group that hacked LastPass, then they might need to travel a long way in order to steal your phone from you.</p>
<p>With the LastPass breach, as of this moment, LastPass thinks that the hackers stole passwords, but that the passwords are all encrypted. They think that, as long as an attacker doesn’t know your password to LastPass, then the attacker won’t be able to use your passwords at any of your protected sites. In addition, if you use two-step login on LastPass, you are quite possibly protected even if the attacker does learn your LastPass password.</p>
<p>If you receive an email that appears to be from LastPass instructing you to &#8220;Click Here to Reset Your Password&#8221;. Do not click; it might be a trick.</p>
<p>Password managers are very helpful. They speed up workflow and prevent problems such as a user using the same password at more than one website. When using a password manager, just be sure to follow the two steps above. Be selective when choosing what passwords to store, and enable two-step login. Find more information about how to handle passwords here: <a href="https://fosterinstitute.com/blog//what-to-do-about-your-passwords/">What to Do About Your Passwords</a></p>
<p>Forward this to everyone you know who uses a password manager. Additionally, forward it to everyone you know who is not using a password manager – they probably should be using one; just be sure they follow the guidelines above.  Thank you for helping keep the world a safer place to live and work!</p>
<p><strong>Password Managers and Two Step Logins</strong></p>
<p>After the LastPass announcement, many readers have reached out with questions about password managers and about two step login. Important points:<br />
First: Just because LastPass discovered, and announced their breach, does not mean that other password managers aren&#8217;t breached as well.</p>
<p>Second: You enabling and configuring two step logon to LastPass, or any other password manager, is intended to make authenticating to that password manager more secure. That strategy is designed to make it more difficult for an attacker to be able to use your password manager to discover or use your passwords to websites.</p>
<p>Remember, a password manager&#8217;s function is to store your passwords for you so that you do not need to type those passwords into websites.</p>
<p>Password Managers are designed to be a tool that provides more of a convenience than security. A password manager also makes it easier for you to use secure password habits. For example, you can use different passwords for each of your websites rather than using the same password on multiple sites, without you needing to remember all of your passwords.</p>
<p>Keep in mind that an attacker could potentially learn your passwords in other ways too.</p>
<p>Therefore, you still need to enable 2-step logon on sites too. Websites such as PayPal, DropBox, GoogleApps, and the many others support two step logon. Now, no matter how an attacker learns your password, the two step login on specific sites is designed to help protect you from bad guys attempting to authenticate to those sites using your password.</p>
<p>Third: Configuring a password manager, or a website, for two-step logon will hopefully be an easy process. However, if you run into difficulty, don&#8217;t give up. Enlist the assistance of someone e-savvy who has experience setting up the two-step logon. Alternatively, you might choose to contact technical support.</p>
<p>Most likely, everything will go smoothly when you follow the instructions. If you decide to search Google for answers to any questions that you have about configuring two step logon on websites and for your password manager, be sure to use Google&#8217;s search tools to restrict the search to recent postings. Finding new instructions obviously works better than following instructions, without your being aware that they are old, outdated instructions that do not work.</p>
<p>Please post your comments below&#8230;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/lastpass-password-manager-hacked/">LastPass Password Manager Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
