SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
1
Conquering The Password
Headache…
Invenio Advisors, LLC
Don Tomoff, CPA, MBA
December 2013
2Invenio Advisors, LLC – Don Tomoff
Disclaimer
Password management is a broad concept
and there are a variety of ways to handle
passwords and maintain security.
Outlined in this presentation is only one
approach that I use - and recommend - to
meet the password management objectives
outlined.
3Invenio Advisors, LLC – Don Tomoff
Password Problem?
Check out video – does this sound familiar?
TAP
Image
to
Play
4Invenio Advisors, LLC – Don Tomoff
Password Problem?
Interesting statistics…
Source: https://lastpass.com
5Invenio Advisors, LLC – Don Tomoff
Problem Hypothesis
Individuals have a difficult time
creating and managing complex,
secure passwords
6Invenio Advisors, LLC – Don Tomoff
Fast Company Article
“Feeling Insecure? Because Your Passwords
Are” November 12, 2013
• “Adobe announced hackers had nabbed the account information of
2.9 million customers…then adjusted it to 38 million…”
• “…turns out that people are often loonily lackadasical with their
passwords.”
• “Additionally, some Adobe users had the gumption to use sensitive
information as their password or hint.” (e.g., social security number)
7Invenio Advisors, LLC – Don Tomoff
Fast Company Article
“The 10 Biggest Password Mistakes People
Make” November 27, 2013
• “Using any of the following terms is like locking your bank vault with
masking tape and good intentions ...”
• #7 –“LetMeIn… Even sticking a "please" on the end would make it
at least somewhat hard, just from the act of adding more letters.”
• #5 - “Swear Words…Unfortunately, by doing this, you're choosing
the first words that are going to pop into someone's head as soon
as they get pissed off that they can't figure out your password.”
• #1 – “Password” – “It's one step above just leaving your computer
sitting unattended on a busy city sidewalk.”
8Invenio Advisors, LLC – Don Tomoff
Secure
NOT
Secure
Convenient NOT Convenient
This is the password conundrum...
9Invenio Advisors, LLC – Don Tomoff
Secure
NOT
Secure
Convenient NOT Convenient
Current state may look like this...
10Invenio Advisors, LLC – Don Tomoff
Secure
NOT
Secure
Convenient NOT Convenient
Challenge is to do this ..
11Invenio Advisors, LLC – Don Tomoff
Password Management
Increasing Security and Reducing Your Headaches
iCloud Keychain
KeePass/KyPass
12Invenio Advisors, LLC – Don Tomoff
Password Management Objectives
Manage and access from any platform or
device ("anytime, anywhere")
Increase password complexity (character
mix, length, and no repeating passwords)
Eliminate the need to remember or
manually key your password
13Invenio Advisors, LLC – Don Tomoff
One Example - Dropbox
Password (ok, not really!)
L&@"2&!b,8s)0Zm,D^Vvl,uKI
What’s the point?
14Invenio Advisors, LLC – Don Tomoff
Password Tools
iCloud Keychain
Meldium
Password "Safe“ (many options, here’s two)
KeePass/KyPass
LastPass
15Invenio Advisors, LLC – Don Tomoff
Three Tools - Coverage
Tool Mobile / PC Comments
iCloud Keychain Mobile Just memorizes and works
– not all passwords (no
user interaction)
Meldium PC Use at your desk
(browser). “One-click”
access to only cloud
services.
Password Safe
(KeePass/KyPass)
• Also, LastPass &
1Password
Mobile/PC Everything – requires user
interaction (however,
enables no memory or re-
keying efforts)
16Invenio Advisors, LLC – Don Tomoff
Three Tools - Coverage
Amount of Effort?
Tool Mobile / PC Keep a List Tool
iCloud
Keychain
Mobile Access,
lookup,
manually enter
None
Meldium PC Access,
lookup,
manually enter
One-click
Password
Safe
(KeePass /
KyPass)
Mobile/PC Access,
lookup,
manually enter
Access,
lookup, copy-
paste
19Invenio Advisors, LLC – Don Tomoff
Passwords Across Devices
Meldium
KeePass
iCloud KeyChain
KyPass
iCloud KeyChain
KyPass
20Invenio Advisors, LLC – Don Tomoff
iCloud Keychain
iCloud Keychain stores your usernames,
passwords, Wi-Fi networks, and credit
card information so that you can easily fill
in forms or logins whenever you need.
This will sync across Safari and with third
party apps that support iCloud Keychain.
Your information is securely protected
using 256-bit AES encryption.
iCloud Keychain also includes a powerful
password generator.
21Invenio Advisors, LLC – Don Tomoff
Intro to iCloud Keychain
22Invenio Advisors, LLC – Don Tomoff
iCloud Keychain Resources
iCloud – FAQ (Apple Support site)
Apple’s iCloud Keychain: It Works, but with Frustrating Limitations
How to access and view your iCloud KeyChain passwords with
iOS7
iCloud Keychain: Everything You need to know and How to set it
up
How to use iCloud KeyChain
How to add credit card information to iCloud KeyChain
23Invenio Advisors, LLC – Don Tomoff
Meldium
More than just another password manager. It
automatically logs you in to your favorite apps
and web sites without typing usernames and
passwords. You get instant access with
extensions for Chrome and Firefox.
Enables your team to share access to apps
without sharing passwords. Protect your
company from phishing attacks and use
strong passwords on all your services.
When you sign in with Google, Meldium
automatically extends its secure two-factor
authentication (2FA) to all your apps.
24Invenio Advisors, LLC – Don Tomoff
Meldium Dashboard
25Invenio Advisors, LLC – Don Tomoff
Meldium Pricing
26Invenio Advisors, LLC – Don Tomoff
Meldium Resources
Home page – www.meldium.com
Meldium blog page
Ditch the Spreadsheet. Meldium Controls
Your Team’s Shared App Passwords For
You
Meldium – Instant Access to Apps
27Invenio Advisors, LLC – Don Tomoff
KeePass & KyPass
Password "safe" - Windows PC
software and compatible app for
mobile devices
"A secure, lengthy, completely
random password goes a long way
towards improving your security–
and having a separate password for
each and every website and service
you use is the single most important
thing you can do to keep secure."
KeePass/KyPass
28Invenio Advisors, LLC – Don Tomoff
KeePass – Master Signon
29Invenio Advisors, LLC – Don Tomoff
KeePass – Desktop View
30Invenio Advisors, LLC – Don Tomoff
KyPass - iPad
31Invenio Advisors, LLC – Don Tomoff
KyPass - iPad
32Invenio Advisors, LLC – Don Tomoff
KyPass - iPhone
33Invenio Advisors, LLC – Don Tomoff
LastPass –
Browser based password safe
TAP
Image
to Access
34Invenio Advisors, LLC – Don Tomoff
Password Safe Resources
KeePass Password Safe – info home page
Keepass: free and open-source password manager
Review: KeePass makes strong passwords and keeps them safe
Review: LastPass takes your passwords to the cloud
1Password vs Lastpass vs KeePass (vs…..a bunch others)
1. Lists pros and cons of various password manager alternatives –
accumulated from Reddit.com posts
2. Definitely worth a review if you are unsure about what password safe you
want to use.
35Invenio Advisors, LLC – Don Tomoff
Contact Invenio Advisors
Don Tomoff, CPA, MBA
don@invenioadvisorsllc.com
LinkedIn Profile
Find Don on the Web
Download Business Card

Mais conteúdo relacionado

Mais procurados

How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobileCarsonified Team
 
Mobile Design for Instructional Designers
Mobile Design for Instructional DesignersMobile Design for Instructional Designers
Mobile Design for Instructional DesignersBrandon Carson
 
Apple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | ArmediaApple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | ArmediaArmedia LLC
 
Pragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignPragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignBrandon Carson
 
Golden years of IT: Past Present and Future
Golden years of IT: Past Present and FutureGolden years of IT: Past Present and Future
Golden years of IT: Past Present and FutureAltaf Rehmani
 
State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10Tim O'Reilly
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldScott Burnett
 
Customer Service Gone Mobile
Customer Service Gone MobileCustomer Service Gone Mobile
Customer Service Gone MobileSarena Fletcher
 
WITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendWITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendBess Ho
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Scott Burnett
 
iPhone - Human Interface Guidelines
iPhone - Human Interface GuidelinesiPhone - Human Interface Guidelines
iPhone - Human Interface GuidelinesMartin Ebner
 
Seeing Through The Clouds
Seeing Through The CloudsSeeing Through The Clouds
Seeing Through The CloudsAtlas Cloud
 
Apps For Actuaries Presentation
Apps For Actuaries PresentationApps For Actuaries Presentation
Apps For Actuaries PresentationRichard Junker
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Scott Burnett
 
WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012Bess Ho
 
Putting Web Into Native App
Putting Web Into Native AppPutting Web Into Native App
Putting Web Into Native AppBess Ho
 
State of the Internet Operating System
State of the Internet Operating SystemState of the Internet Operating System
State of the Internet Operating SystemTim O'Reilly
 

Mais procurados (20)

How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobile
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
 
Mobile Design for Instructional Designers
Mobile Design for Instructional DesignersMobile Design for Instructional Designers
Mobile Design for Instructional Designers
 
Apple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | ArmediaApple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | Armedia
 
Pragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignPragmatic Principles for Mobile Design
Pragmatic Principles for Mobile Design
 
Golden years of IT: Past Present and Future
Golden years of IT: Past Present and FutureGolden years of IT: Past Present and Future
Golden years of IT: Past Present and Future
 
State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 
Customer Service Gone Mobile
Customer Service Gone MobileCustomer Service Gone Mobile
Customer Service Gone Mobile
 
WITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendWITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile Trend
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
 
iPhone - Human Interface Guidelines
iPhone - Human Interface GuidelinesiPhone - Human Interface Guidelines
iPhone - Human Interface Guidelines
 
Seeing Through The Clouds
Seeing Through The CloudsSeeing Through The Clouds
Seeing Through The Clouds
 
Web 2.0 - Then And Now
Web 2.0 - Then And NowWeb 2.0 - Then And Now
Web 2.0 - Then And Now
 
Apps For Actuaries Presentation
Apps For Actuaries PresentationApps For Actuaries Presentation
Apps For Actuaries Presentation
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
 
WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012
 
Putting Web Into Native App
Putting Web Into Native AppPutting Web Into Native App
Putting Web Into Native App
 
What's Coming Coming Coming
What's Coming Coming ComingWhat's Coming Coming Coming
What's Coming Coming Coming
 
State of the Internet Operating System
State of the Internet Operating SystemState of the Internet Operating System
State of the Internet Operating System
 

Semelhante a Conquering The Password Headache With Secure Password Management Tools

Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentationJoan Dembowski
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwordsBunmi Sowande
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011John Mayfield
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRBJohn Mayfield
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Bemorisson
 
Giant bags of mostly water
Giant bags of mostly waterGiant bags of mostly water
Giant bags of mostly waterroensel
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsn|u - The Open Security Community
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Security Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an EnablerSecurity Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an EnablerNordic APIs
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyShawn Tuma
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderBen Johnson
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10iphonepentest
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 

Semelhante a Conquering The Password Headache With Secure Password Management Tools (20)

Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRB
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
Giant bags of mostly water
Giant bags of mostly waterGiant bags of mostly water
Giant bags of mostly water
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Security Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an EnablerSecurity Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an Enabler
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Db2z bp security_transcript
Db2z bp security_transcriptDb2z bp security_transcript
Db2z bp security_transcript
 

Mais de Invenio Advisors, LLC

Tip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdfTip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdfInvenio Advisors, LLC
 
Creating a To Done list Process using Evernote
Creating a To Done list Process using EvernoteCreating a To Done list Process using Evernote
Creating a To Done list Process using EvernoteInvenio Advisors, LLC
 
2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernote2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernoteInvenio Advisors, LLC
 
2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tips2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tipsInvenio Advisors, LLC
 
2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)Invenio Advisors, LLC
 
2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business Professional2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business ProfessionalInvenio Advisors, LLC
 
2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-Pres2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-PresInvenio Advisors, LLC
 
Accounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and TechnologyAccounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and TechnologyInvenio Advisors, LLC
 
2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-Newsreader2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-NewsreaderInvenio Advisors, LLC
 
Invenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader TrainingInvenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader TrainingInvenio Advisors, LLC
 
SWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-DisruptionSWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-DisruptionInvenio Advisors, LLC
 
2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshareInvenio Advisors, LLC
 
Invenio executive dashboards - considerations
Invenio executive dashboards - considerationsInvenio executive dashboards - considerations
Invenio executive dashboards - considerationsInvenio Advisors, LLC
 

Mais de Invenio Advisors, LLC (19)

Tip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdfTip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdf
 
Creating a To Done list Process using Evernote
Creating a To Done list Process using EvernoteCreating a To Done list Process using Evernote
Creating a To Done list Process using Evernote
 
PowerQuery Can Do That!
PowerQuery Can Do That!PowerQuery Can Do That!
PowerQuery Can Do That!
 
2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernote2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernote
 
2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tips2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tips
 
2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)
 
2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business Professional2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business Professional
 
Five Excel Productivity Hacks
Five Excel Productivity HacksFive Excel Productivity Hacks
Five Excel Productivity Hacks
 
2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-Pres2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-Pres
 
Getting LinkedIn - 2014
Getting LinkedIn - 2014Getting LinkedIn - 2014
Getting LinkedIn - 2014
 
Accounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and TechnologyAccounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and Technology
 
2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-Newsreader2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-Newsreader
 
Invenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader TrainingInvenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader Training
 
SWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-DisruptionSWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-Disruption
 
So You Know Excel Pivot Tables?
So You Know Excel Pivot Tables?So You Know Excel Pivot Tables?
So You Know Excel Pivot Tables?
 
2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare
 
Don Tomoff Linkedin_profile
Don Tomoff Linkedin_profileDon Tomoff Linkedin_profile
Don Tomoff Linkedin_profile
 
Invenio executive dashboards - considerations
Invenio executive dashboards - considerationsInvenio executive dashboards - considerations
Invenio executive dashboards - considerations
 
Invenio advisors overview
Invenio advisors overviewInvenio advisors overview
Invenio advisors overview
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Conquering The Password Headache With Secure Password Management Tools

  • 1. 1 Conquering The Password Headache… Invenio Advisors, LLC Don Tomoff, CPA, MBA December 2013
  • 2. 2Invenio Advisors, LLC – Don Tomoff Disclaimer Password management is a broad concept and there are a variety of ways to handle passwords and maintain security. Outlined in this presentation is only one approach that I use - and recommend - to meet the password management objectives outlined.
  • 3. 3Invenio Advisors, LLC – Don Tomoff Password Problem? Check out video – does this sound familiar? TAP Image to Play
  • 4. 4Invenio Advisors, LLC – Don Tomoff Password Problem? Interesting statistics… Source: https://lastpass.com
  • 5. 5Invenio Advisors, LLC – Don Tomoff Problem Hypothesis Individuals have a difficult time creating and managing complex, secure passwords
  • 6. 6Invenio Advisors, LLC – Don Tomoff Fast Company Article “Feeling Insecure? Because Your Passwords Are” November 12, 2013 • “Adobe announced hackers had nabbed the account information of 2.9 million customers…then adjusted it to 38 million…” • “…turns out that people are often loonily lackadasical with their passwords.” • “Additionally, some Adobe users had the gumption to use sensitive information as their password or hint.” (e.g., social security number)
  • 7. 7Invenio Advisors, LLC – Don Tomoff Fast Company Article “The 10 Biggest Password Mistakes People Make” November 27, 2013 • “Using any of the following terms is like locking your bank vault with masking tape and good intentions ...” • #7 –“LetMeIn… Even sticking a "please" on the end would make it at least somewhat hard, just from the act of adding more letters.” • #5 - “Swear Words…Unfortunately, by doing this, you're choosing the first words that are going to pop into someone's head as soon as they get pissed off that they can't figure out your password.” • #1 – “Password” – “It's one step above just leaving your computer sitting unattended on a busy city sidewalk.”
  • 8. 8Invenio Advisors, LLC – Don Tomoff Secure NOT Secure Convenient NOT Convenient This is the password conundrum...
  • 9. 9Invenio Advisors, LLC – Don Tomoff Secure NOT Secure Convenient NOT Convenient Current state may look like this...
  • 10. 10Invenio Advisors, LLC – Don Tomoff Secure NOT Secure Convenient NOT Convenient Challenge is to do this ..
  • 11. 11Invenio Advisors, LLC – Don Tomoff Password Management Increasing Security and Reducing Your Headaches iCloud Keychain KeePass/KyPass
  • 12. 12Invenio Advisors, LLC – Don Tomoff Password Management Objectives Manage and access from any platform or device ("anytime, anywhere") Increase password complexity (character mix, length, and no repeating passwords) Eliminate the need to remember or manually key your password
  • 13. 13Invenio Advisors, LLC – Don Tomoff One Example - Dropbox Password (ok, not really!) L&@"2&!b,8s)0Zm,D^Vvl,uKI What’s the point?
  • 14. 14Invenio Advisors, LLC – Don Tomoff Password Tools iCloud Keychain Meldium Password "Safe“ (many options, here’s two) KeePass/KyPass LastPass
  • 15. 15Invenio Advisors, LLC – Don Tomoff Three Tools - Coverage Tool Mobile / PC Comments iCloud Keychain Mobile Just memorizes and works – not all passwords (no user interaction) Meldium PC Use at your desk (browser). “One-click” access to only cloud services. Password Safe (KeePass/KyPass) • Also, LastPass & 1Password Mobile/PC Everything – requires user interaction (however, enables no memory or re- keying efforts)
  • 16. 16Invenio Advisors, LLC – Don Tomoff Three Tools - Coverage Amount of Effort? Tool Mobile / PC Keep a List Tool iCloud Keychain Mobile Access, lookup, manually enter None Meldium PC Access, lookup, manually enter One-click Password Safe (KeePass / KyPass) Mobile/PC Access, lookup, manually enter Access, lookup, copy- paste
  • 17. 19Invenio Advisors, LLC – Don Tomoff Passwords Across Devices Meldium KeePass iCloud KeyChain KyPass iCloud KeyChain KyPass
  • 18. 20Invenio Advisors, LLC – Don Tomoff iCloud Keychain iCloud Keychain stores your usernames, passwords, Wi-Fi networks, and credit card information so that you can easily fill in forms or logins whenever you need. This will sync across Safari and with third party apps that support iCloud Keychain. Your information is securely protected using 256-bit AES encryption. iCloud Keychain also includes a powerful password generator.
  • 19. 21Invenio Advisors, LLC – Don Tomoff Intro to iCloud Keychain
  • 20. 22Invenio Advisors, LLC – Don Tomoff iCloud Keychain Resources iCloud – FAQ (Apple Support site) Apple’s iCloud Keychain: It Works, but with Frustrating Limitations How to access and view your iCloud KeyChain passwords with iOS7 iCloud Keychain: Everything You need to know and How to set it up How to use iCloud KeyChain How to add credit card information to iCloud KeyChain
  • 21. 23Invenio Advisors, LLC – Don Tomoff Meldium More than just another password manager. It automatically logs you in to your favorite apps and web sites without typing usernames and passwords. You get instant access with extensions for Chrome and Firefox. Enables your team to share access to apps without sharing passwords. Protect your company from phishing attacks and use strong passwords on all your services. When you sign in with Google, Meldium automatically extends its secure two-factor authentication (2FA) to all your apps.
  • 22. 24Invenio Advisors, LLC – Don Tomoff Meldium Dashboard
  • 23. 25Invenio Advisors, LLC – Don Tomoff Meldium Pricing
  • 24. 26Invenio Advisors, LLC – Don Tomoff Meldium Resources Home page – www.meldium.com Meldium blog page Ditch the Spreadsheet. Meldium Controls Your Team’s Shared App Passwords For You Meldium – Instant Access to Apps
  • 25. 27Invenio Advisors, LLC – Don Tomoff KeePass & KyPass Password "safe" - Windows PC software and compatible app for mobile devices "A secure, lengthy, completely random password goes a long way towards improving your security– and having a separate password for each and every website and service you use is the single most important thing you can do to keep secure." KeePass/KyPass
  • 26. 28Invenio Advisors, LLC – Don Tomoff KeePass – Master Signon
  • 27. 29Invenio Advisors, LLC – Don Tomoff KeePass – Desktop View
  • 28. 30Invenio Advisors, LLC – Don Tomoff KyPass - iPad
  • 29. 31Invenio Advisors, LLC – Don Tomoff KyPass - iPad
  • 30. 32Invenio Advisors, LLC – Don Tomoff KyPass - iPhone
  • 31. 33Invenio Advisors, LLC – Don Tomoff LastPass – Browser based password safe TAP Image to Access
  • 32. 34Invenio Advisors, LLC – Don Tomoff Password Safe Resources KeePass Password Safe – info home page Keepass: free and open-source password manager Review: KeePass makes strong passwords and keeps them safe Review: LastPass takes your passwords to the cloud 1Password vs Lastpass vs KeePass (vs…..a bunch others) 1. Lists pros and cons of various password manager alternatives – accumulated from Reddit.com posts 2. Definitely worth a review if you are unsure about what password safe you want to use.
  • 33. 35Invenio Advisors, LLC – Don Tomoff Contact Invenio Advisors Don Tomoff, CPA, MBA don@invenioadvisorsllc.com LinkedIn Profile Find Don on the Web Download Business Card