<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>password Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/password/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/password/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 02 May 2008 15:10:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>password Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/password/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Answers to the trouble with passwords</title>
		<link>https://fosterinstitute.com/trouble-with-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 02 May 2008 15:10:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[biometric]]></category>
		<category><![CDATA[fingerprint]]></category>
		<category><![CDATA[fob]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[token]]></category>
		<category><![CDATA[two factor]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=15</guid>

					<description><![CDATA[<p>One of the biggest problems with passwords is that secure ones seem hard to remember, need to be changed often, and should be phrases with numbers and symbols instead of just single words that can be found in a dictionary. Many organizations have a culture where the IT department has been instructed to allow users [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/trouble-with-passwords/">Answers to the trouble with passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the biggest problems with passwords is that secure ones seem hard to remember, need to be changed often, and should be phrases with numbers and symbols instead of just single words that can be found in a dictionary. Many organizations have a culture where the IT department has been instructed to allow users to keep insecure passwords. Rather than fight this battle, consider using two factor authentication: something the user has plus something they know. For example, <a href="http://www.phonefactor.net">www.phonefactor.net</a> uses</p>
<p><span id="more-2677"></span></p>
<p>an out-of-band signaling strategy for users when they log in. The user enters a username and password (something they know), and then your system calls their phone (something they have) to have them enter a pin.  That way, for someone to impersonate a user, they would have to know the user&#8217;s username and password, and also have the user&#8217;s mobile phone.  This is a very economical way to increase password strength &#8211; especially if your organization&#8217;s culture dictates using simple passwords.</p>
<p>Other options include having the users carry secure USB tokens that plug into their computer much the way a user would start their car with a car key. Examples include <a href="http://www.aladdin.com/etoken">www.aladdin.com/etoken</a> and <a href="http://www.everythingusb.com/guard_id_vault.html">www.everythingusb.com/guard_id_vault.html</a>.</p>
<p>Additionally you could choose to use a RSA SecurID <a href="http://www.rsasecurity.com">www.rsasecurity.com</a> device, a biometric fingerprint reader, or SmartCard two factor authentication device.</p>
<p>Another interesting product is the iTag from <a href="http://www.encentuate.com">www.encentuate.com</a> that lets you stick a tag on whatever your users carry with them now. An id badge, their mobile phone, etc. This product provides single sign-on features many organizations crave. For example, single sign-on allows users to log into more than one operating system in just one step.</p>
<p>The post <a href="https://fosterinstitute.com/trouble-with-passwords/">Answers to the trouble with passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
