Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Backup
      • Microsoft 365 Backup
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Backup
    • Microsoft 365 Backup
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Author: 11:11 Systems
Date: October 6, 2021

Passwords, Multi-Factor Authentication and You

You’re logging in for the first time in a while. But you can’t remember what your password is. Is that even the right username? Which email did I sign up with? You try a couple combinations with no luck. Looks like you’re going to waste some more time going through the password reset process.

Sound familiar? It should, because we’ve all been there. If only there was a way to create and securely store passwords and passphrases without having to memorize them all.

Password Managers. Enter the password manager. There are a lot of them out there, some paid and some free. But seriously – you really do need this in your life. A password manager will revolutionize the way you secure your accounts and help you create long and difficult passwords without having to even memorize them.

So how do password managers work? The concept is relatively simple. A password manager is an application on your local device that maintains a database of all your usernames and passwords. To unlock that database and keep it secure you configure one “master password” to access the information. This master password should be long and complex, of course, but it is the only password you need to memorize. For bonus points, create a passphrase like “yellowflowerprariegreenland” – it’s easy to memorize and insanely difficult for cybercriminals to crack.

So say you need to log in to Facebook. No problem. Navigate to Facebook, spin up your password manager, give it the master password, locate your Facebook credentials and then copy and paste. Voila. In fact, you may not even know what your Facebook password is (because it’s too long and complex to remember), but you’re able to log in regardless. It really is that simple.

One of the other great things about using password managers is that they encourage you to create long and complicated passwords or passphrases for your accounts. Many of them even offer an integrated password or passphrase generator that can be configured for desired complexity.

Seriously, do yourself a favor and get a password manager. Then take the time to go through all of your accounts and ensure that they are all in your password manager and – most importantly – that they have long and complicated passwords or passphrases that would take modern computers billions of years to break! It might take a bit of time to get all of your accounts integrated, but the juice is well worth the squeeze.

If you’re not sure where to start with password managers, have a look at some of the most popular services:

  1. LastPass
  2. 1Password
  3. KeePassXC
  4. Dashlane

Multi-Factor Authentication. So you’ve set up your password manager and integrated your accounts. How about taking it a step further and to really lock down your information and ensure you don’t become another cyber crime statistic? Again, the answer is surprisingly simple – multi-factor authentication!

Multi-factor authentication (MFA) is just what it sounds like – authentication with multiple factors. These factors are most commonly what you are (biometrics), who you are (personal information), what you know (secret), and/or what you have (e.g. a key or a card). When you combine authentication into a requirement for two or more of these factors, then you have MFA. Believe it or not most people have been using MFA for a long time now. Think about when you withdraw some money from an ATM. You are required to provide something you have (a card) and something you know (a pin code). And there you have it.

So even if you forego the password manager, MFA can literally stop cybercriminals in their tracks. Because with MFA even if someone manages to break get ahold of your username and password, they won’t be able to get far without also having your MFA solution.

Need some suggestions on MFA solutions? Again, in no particular order, we’ve got you covered:

  1. Google Auth
  2. Authy
  3. Duo
  4. SecureAuth

Though we generally recommend that you avoid using MFA through SMS texted codes due to the vulnerabilities it has, even this can be an adequate deterrent for cybercriminals looking for an easy score. So if you can’t be bothered with MFA, first of all we encourage you to rethink that decision. But most importantly, do try and sign up for the SMS- or email-based option on your accounts if possible.

As always, remember that with any security tools and practices, nothing is ever completely safe. In fact, there are ways to circumvent any security tool. But at the end of the day, just use common sense and think before you click!

 

Jonathan Melvin
SOC Analyst
Green Cloud Defense

Category: SecurityBy 11:11 SystemsOctober 6, 2021
11:11 Systems

Author: 11:11 Systems

Post navigation

PreviousPrevious post:Litigation Hold Is Not BackupNextNext post:Protect Any Workload from Ransomware with the Veeam Agent and Secure BaaS

Related Posts

Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
What is 11:11 Systems?
What is 11:11 Systems? A company built on cloud, connectivity, and security
January 30, 2023
11:11 Systems Wins 2022 Backup and Disaster Recovery Award from Cloud Computing Magazine
January 25, 2023
Why Staying Connected to the Cloud Can Be Simple, Secure, and Seamless
Why Staying Connected to the Cloud Can Be Simple, Secure, and Seamless
January 24, 2023
11:11 Managed Connectivity Solutions
11:11 Managed Connectivity Solutions
January 23, 2023
Risky Business
Risky Business: Managing Vulnerabilities by Prioritizing Risk
January 11, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}