User Tools

Site Tools


passwords

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
passwords [2019/08/10 08:45] โ€“ neilpasswords [2021/07/06 09:26] (current) โ€“ external edit 127.0.0.1
Line 4: Line 4:
   * [[passwords#Use a unique email address, and a unique password, for every site and service|Use a unique email address, and a unique password, for every site and service]]   * [[passwords#Use a unique email address, and a unique password, for every site and service|Use a unique email address, and a unique password, for every site and service]]
   * [[passwords#Use a strong password|Use a strong password]]   * [[passwords#Use a strong password|Use a strong password]]
 +  * [[passwords#For mobile devices with a PIN, use an non-obvious PIN|For mobile devices with a PIN, use a non-obvious PIN]]
   * [[passwords#Use a password manager|Use a password manager]]   * [[passwords#Use a password manager|Use a password manager]]
   * [[passwords#Do not change your passwords without reason|Do not change your passwords without reason]]   * [[passwords#Do not change your passwords without reason|Do not change your passwords without reason]]
Line 9: Line 10:
   * [[passwords#Consider if biometric security is right for you|Consider if biometric security is right for you]]   * [[passwords#Consider if biometric security is right for you|Consider if biometric security is right for you]]
   * [[passwords#Wherever possible, set up two-factor authentication|Wherever possible, set up two-factor authentication]]   * [[passwords#Wherever possible, set up two-factor authentication|Wherever possible, set up two-factor authentication]]
 +  * [[passwords#Limit the locations from which you can log in|Limit the locations from which you can log in]]
  
 ====Use a unique email address, and a unique password, for every site and service ==== ====Use a unique email address, and a unique password, for every site and service ====
Line 65: Line 67:
 If you use a password manager, you do not need to remember the password, and you can probably cut-and-paste it into the site or service, meaning it does not matter how long it is, or if it contains a complicated spelling. If you use a password manager, you do not need to remember the password, and you can probably cut-and-paste it into the site or service, meaning it does not matter how long it is, or if it contains a complicated spelling.
  
-====For mobile devices with a PIN, do not use an obvious PIN ===+====For mobile devices with a PIN, use a non-obvious PIN ===
  
 If you have a mobile device with a PIN rathe than a password, do not use an obvious PIN. If you have a mobile device with a PIN rathe than a password, do not use an obvious PIN.
Line 83: Line 85:
 It may seem counterintuitive to write down all your passwords in one piece of software, but the [[https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers|National Cyber Security Centre's guidance]] is that the benefits outweigh the risks. It may seem counterintuitive to write down all your passwords in one piece of software, but the [[https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers|National Cyber Security Centre's guidance]] is that the benefits outweigh the risks.
  
-There are a number of different options to choose from.ย +There are a number of different options to choose from, depending on what features you want:ย 
-ย +  [[https://1password.com|1Password]]ย 
-My preference is [[https://1password.com|1Password]].ย +  [[https://keepass.info|KeePass]]ย 
-ย +  * [[https://bitwarden.com|Bitwarden]]
-See also [[https://keepass.info|KeePass]].+
  
 === If your password manager is cloud-based, assess their security model === === If your password manager is cloud-based, assess their security model ===
Line 127: Line 128:
  
 Depending on the outcome of your [[threat_modelling|threat modelling]], you may decide that the convenience is an acceptable compromise. Depending on the outcome of your [[threat_modelling|threat modelling]], you may decide that the convenience is an acceptable compromise.
 +
 +===You cannot change your face or fingerprints ===
 +
 +You should use a different username and password for every account or service you use.
 +
 +Clearly, you cannot do this for biometrics (well, not beyond 10, in the case of most people, when it comes to finger/thumb prints).
 +
 +Moreover, you cannot realistically change your face, if an insecure storage of biometric credentials is compromised.
 +
 +
 +===Disable them in higher-risk situations ===
  
 You might also decide to use these unlock mechanisms most of the time, but disable them for certain activities (e.g. for travelling across borders). You might also decide to use these unlock mechanisms most of the time, but disable them for certain activities (e.g. for travelling across borders).
Line 142: Line 154:
  
 See [[two-factor_authentication|two-factor authentication]]. See [[two-factor_authentication|two-factor authentication]].
 +
 +====Limit the locations from which you can log in ====
 +
 +If you can feasibly do so, restrict logins so that you can only log in from certain networks or IP address ranges. 
 +
 +If, for example, you always connect via a [[virtual_private_networks|VPN]], you could restrict logins to the IP address ranges used by your VPN.
 +
 +Someone who is not connected via the same network should not be able to log in, even if they know your username and password. If, however, the attacker is someone within your organisation, and has access to the same networks / IP address ranges, this control is likely to be ineffective.
 +
 +If you do this, you need to accept that risk that, if you cannot connect to your VPN, or if your VPN endpoint's IP address ranges change, you will not be able to log in.
passwords.1565426723.txt.gz ยท Last modified: 2021/07/06 09:26 (external edit)