Protecting your online identity Managing your passwords

18th of December 2013
Securing your online identity
Managing your passwords
Agenda

Bunmi Sowande
Technical Specialist – F-Secure (UK)
bunmi_Sowande@f-secure.com
07818 515 687

1.
2.
3.
4.
5.
6.

Security in the news
Recent password breaches
What‟s the most popular password?
How websites store your passwords
Password Best Practice - (Mission Impossible?)
Using a Password Manager – F-Secure Key
Protecting your online identity -  Managing your passwords
Awarded Best Protection
“Out of all corporate
endpoint protection
products reviewed, FSecure Client Security
offered by far the best
protection.”

Andreas Marx,
CEO of AV-TEST

Certified and Awarded
by numerous 3rd parties!
Praised by Analysts
The Forrester Wave™: Endpoint Security, Q1 2013

Forrester Research Inc. gave us the
highest score among all vendors for
our product roadmap and strategy.

We received top ranking scores on
our performance and satisfaction, in
addition to our advanced antimalware technologies.
Comprehensive Protection
Providing 360 protection from all threats
Protection Service for Business

Business Suite
In-House IT

Policy Manager

Management as a Service

Internet Gatekeeper Messaging Security
Gateway

PSB Portal

Out-sourced IT

Server Security

Client Security

Email and Server
Security

Mobile Security

Linux Security

AV for
Workstations

PSB Server
Security

PSB Email and
Server Security

PSB Workstation
Security

Protection
Service for Email

PSB Mobile Security
Karmina
Senior Analyst

Security in the news
Security in the News
Security in the News
Security in the News
Security in the News
Security in the News - Passwords
Security in the News - Passwords
Data Breaches in 2013
Adobe – 38 million accounts – October
Evernote – 50 million passwords reset - March
Twitter – 250,000 accounts – February
Facebook – Email addresses and phone
numbers for 6 million users – June
Other ’famous’ breaches
LinkedIn – June 2012 – 6.5 million passwords
Sony PlayStation Network – April 2011 – 77
million accounts
Adobe Hack – Analysis of data
• 123456 – 1.9 million passwords
• 123456789 – Around 450,000
passwords
• “password” – 346,000 passwords
• Poor encryption meant
passwords were easy to
determine
• Password hints were stored in
plain text
How do we pick our passwords?

Poor passwords go right to the top !!
How do sites store your passwords
• Plain Text
Cupid Media – November 2013 – 30 Million passwords

•
•
•
•

Basic Password Encryption
Hashed Passwords – e.g. SHA-1
Salted Hashed Passwords
Slow Hashes
How do sites store your passwords
SHA1 Hash of a password 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
Length is more important that complexity
Password – Best Practices
Don‟t write down or share your passwords
Don‟t use websites with poor security
Use a strong password – length is better than complexity
Always change your password after a breach
Use a different password for every site
If you are unsure of a website‟s security, use Oauth where
available
Use 2 factor Authentication where available
2 Factor Authentication
Something you know + Something you have
2 Factor Authentication
•
•
•
•
•
•
•
•
•
•
•
•

Google/Gmail - Text Message or Google Authenticator
LinkedIn – Text Message
Apple – Text Message or Find My iPhone Notification
Facebook – Login Approvals – Text Message
Twitter – Text Message
Dropbox – Text Message or Google Authenticator
Evernote – Google Authenticator
Paypal - Text Message
Steam - Email
Microsoft Accounts – Text Message or Email
Yahoo! – Text Message
Wordpress – Google Authenticator
What is a strong password ??
•
•
•
•

12 Characters
Not a Dictionary Word
No Personal Information
Use Upper and lower case letters, numbers and symbols
F-Secure Key – Password Manager

Built with Security in Mind
Completely anonymous- even F-Secure cannot identify who
you are/what is your data
Multiple layers of protection – Data is „encrypted‟ securely.
Works on PC‟s, Macs and Tablets
F-Secure Mobile Apps
Best Protection for your Android Device
Anti Theft
Anti Malware
Browsing Protection
Parental Control
Safe Contacts

F-Secure Lokki

Personal
Location
tracking for
family and
friends

F-Secure App
Permissions
One app to reveal
them all

Displays the permissions
for all the apps on your
phone.
For example, see apps
that can cost you money
or drain your battery
F-Secure Mobile Apps – Coming Soon
Security in the Cloud
Tracking Protection
Virus Protection
Browsing Protection
Connection Protection
Virtual Location
Sign up for early access at
http://freedome.f-secure.com

Cloud Storage - It's your stuff. Not theirs.
We believe in people‟s right to privacy.
No spying. No backdoors. Access Everything, everywhere.
Access your content from Facebook, Picasa
Younited for Business – Collaborate and share

Sign up for early access at www.younited.com
Questions ??

Next Webinar – January 15th 2014 (11am)

Securing Virtual and Cloud Environments
Register now at http://bit.ly/fswebinar3
Save the Date
Securing Virtual and Cloud environments
Wednesday 15 January @ 11:00-11:45
Why SMBs are outsourcing Security to Managed Service Providers
Wednesday 12 February @ 11:00-11:45
It’s time for business to secure their mobile phones and tablets
Wednesday 12 March @ 11:00-11:45

More Related Content

PPTX
How to-become-secure-and-stay-secure
PDF
Your internet-exposure-that-makes-you-vulnerable
PDF
Securing Yourself in the Cyber World
DOCX
Unit 7 - Password Policies and Procedures - Babeli
PPTX
Web Application Security - DevFest + GDay George Town 2016
PDF
How to choose a password that’s hard to crack
PPT
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
PDF
Mobile Hacking
How to-become-secure-and-stay-secure
Your internet-exposure-that-makes-you-vulnerable
Securing Yourself in the Cyber World
Unit 7 - Password Policies and Procedures - Babeli
Web Application Security - DevFest + GDay George Town 2016
How to choose a password that’s hard to crack
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Mobile Hacking

What's hot (20)

PPTX
ZeroNights2013 testing of password policy
PDF
Hijacking Softwares for fun and profit
PDF
Ground Zero Training- Metasploit For Web
PPTX
Spy Software
PDF
Basics of Meterpreter Evasion
PDF
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
PPT
Mobile phone Data Hacking
PPTX
Web security
PPT
Ethical Hacking and Network Security
PPTX
03 secure the computer
PPTX
Assume breach, layered security in Azure tested and explained
PPTX
Improving Password Based Security
PPTX
An Introduction To IT Security And Privacy - Servers And More
PDF
How To [relatively] Secure your Web Applications
PPTX
An Introduction To IT Security And Privacy In Libraries
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PDF
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
PPT
Hack me now, hack me then @ btp
PPTX
04 secure the human
PPTX
Cybereason - behind the HackingTeam infection server
ZeroNights2013 testing of password policy
Hijacking Softwares for fun and profit
Ground Zero Training- Metasploit For Web
Spy Software
Basics of Meterpreter Evasion
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Mobile phone Data Hacking
Web security
Ethical Hacking and Network Security
03 secure the computer
Assume breach, layered security in Azure tested and explained
Improving Password Based Security
An Introduction To IT Security And Privacy - Servers And More
How To [relatively] Secure your Web Applications
An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries & Anywhere
TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
Hack me now, hack me then @ btp
04 secure the human
Cybereason - behind the HackingTeam infection server
Ad

Viewers also liked (6)

PDF
Ache flavonoides
PPTX
Securing Virtual and Cloud Environments
PPTX
How Malware Works - Understanding Software Vulnerabilities
PDF
Receitas AlimentaçãO Escolar Lanche Gostoso 09
PDF
Hype vs. Reality: The AI Explainer
PDF
Study: The Future of VR, AR and Self-Driving Cars
Ache flavonoides
Securing Virtual and Cloud Environments
How Malware Works - Understanding Software Vulnerabilities
Receitas AlimentaçãO Escolar Lanche Gostoso 09
Hype vs. Reality: The AI Explainer
Study: The Future of VR, AR and Self-Driving Cars
Ad

Similar to Protecting your online identity - Managing your passwords (20)

PDF
W make107
PDF
Password and Account Management Strategies - April 2019
PPTX
Securing your digital life - Jason Addie
PDF
Be Cyber Smart! (DLH 10/25/2019)
PDF
Why is password protection a fallacy a point of view
PDF
W make107
PPT
Let me in! 10 tips to better passwords
PPTX
Personal internet security
PPTX
Password management
PPTX
The Top Password Security Trends
DOC
Protect Your Business With Web Security
PDF
2 Factor Authentication for Wordpress
PPTX
Lkw Security Part 1_MVPs Azra & Sanjay
PPT
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
PPTX
Cybersecurity awareness _20241220_223916_0000.pptx
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PPTX
How to Create (use use) Strong & Unique Passwords
PDF
Why is password protection a fallacy a point of view
ODP
Secure Password Management, Informal, @WalmartLabs
PDF
Is your data safe Infographic by Symantec
W make107
Password and Account Management Strategies - April 2019
Securing your digital life - Jason Addie
Be Cyber Smart! (DLH 10/25/2019)
Why is password protection a fallacy a point of view
W make107
Let me in! 10 tips to better passwords
Personal internet security
Password management
The Top Password Security Trends
Protect Your Business With Web Security
2 Factor Authentication for Wordpress
Lkw Security Part 1_MVPs Azra & Sanjay
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
Cybersecurity awareness _20241220_223916_0000.pptx
How to Protect Yourself From Heartbleed Security Flaw
How to Create (use use) Strong & Unique Passwords
Why is password protection a fallacy a point of view
Secure Password Management, Informal, @WalmartLabs
Is your data safe Infographic by Symantec

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Configure Apache Mutual Authentication
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
What is a Computer? Input Devices /output devices
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
Modernising the Digital Integration Hub
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
NewMind AI Weekly Chronicles – August ’25 Week III
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Build Your First AI Agent with UiPath.pptx
Consumable AI The What, Why & How for Small Teams.pdf
UiPath Agentic Automation session 1: RPA to Agents
Final SEM Unit 1 for mit wpu at pune .pptx
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
CloudStack 4.21: First Look Webinar slides
Configure Apache Mutual Authentication
OpenACC and Open Hackathons Monthly Highlights July 2025
Taming the Chaos: How to Turn Unstructured Data into Decisions
A review of recent deep learning applications in wood surface defect identifi...
What is a Computer? Input Devices /output devices
A proposed approach for plagiarism detection in Myanmar Unicode text
Modernising the Digital Integration Hub
2018-HIPAA-Renewal-Training for executives
sbt 2.0: go big (Scala Days 2025 edition)
Improvisation in detection of pomegranate leaf disease using transfer learni...
Zenith AI: Advanced Artificial Intelligence
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor

Protecting your online identity - Managing your passwords

  • 1. Protecting your online identity Managing your passwords 18th of December 2013
  • 2. Securing your online identity Managing your passwords Agenda Bunmi Sowande Technical Specialist – F-Secure (UK) bunmi_Sowande@f-secure.com 07818 515 687 1. 2. 3. 4. 5. 6. Security in the news Recent password breaches What‟s the most popular password? How websites store your passwords Password Best Practice - (Mission Impossible?) Using a Password Manager – F-Secure Key
  • 4. Awarded Best Protection “Out of all corporate endpoint protection products reviewed, FSecure Client Security offered by far the best protection.” Andreas Marx, CEO of AV-TEST Certified and Awarded by numerous 3rd parties!
  • 5. Praised by Analysts The Forrester Wave™: Endpoint Security, Q1 2013 Forrester Research Inc. gave us the highest score among all vendors for our product roadmap and strategy. We received top ranking scores on our performance and satisfaction, in addition to our advanced antimalware technologies.
  • 6. Comprehensive Protection Providing 360 protection from all threats Protection Service for Business Business Suite In-House IT Policy Manager Management as a Service Internet Gatekeeper Messaging Security Gateway PSB Portal Out-sourced IT Server Security Client Security Email and Server Security Mobile Security Linux Security AV for Workstations PSB Server Security PSB Email and Server Security PSB Workstation Security Protection Service for Email PSB Mobile Security
  • 12. Security in the News - Passwords
  • 13. Security in the News - Passwords
  • 14. Data Breaches in 2013 Adobe – 38 million accounts – October Evernote – 50 million passwords reset - March Twitter – 250,000 accounts – February Facebook – Email addresses and phone numbers for 6 million users – June
  • 15. Other ’famous’ breaches LinkedIn – June 2012 – 6.5 million passwords Sony PlayStation Network – April 2011 – 77 million accounts
  • 16. Adobe Hack – Analysis of data • 123456 – 1.9 million passwords • 123456789 – Around 450,000 passwords • “password” – 346,000 passwords • Poor encryption meant passwords were easy to determine • Password hints were stored in plain text
  • 17. How do we pick our passwords? Poor passwords go right to the top !!
  • 18. How do sites store your passwords • Plain Text Cupid Media – November 2013 – 30 Million passwords • • • • Basic Password Encryption Hashed Passwords – e.g. SHA-1 Salted Hashed Passwords Slow Hashes
  • 19. How do sites store your passwords SHA1 Hash of a password 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
  • 20. Length is more important that complexity
  • 21. Password – Best Practices Don‟t write down or share your passwords Don‟t use websites with poor security Use a strong password – length is better than complexity Always change your password after a breach Use a different password for every site If you are unsure of a website‟s security, use Oauth where available Use 2 factor Authentication where available
  • 22. 2 Factor Authentication Something you know + Something you have
  • 23. 2 Factor Authentication • • • • • • • • • • • • Google/Gmail - Text Message or Google Authenticator LinkedIn – Text Message Apple – Text Message or Find My iPhone Notification Facebook – Login Approvals – Text Message Twitter – Text Message Dropbox – Text Message or Google Authenticator Evernote – Google Authenticator Paypal - Text Message Steam - Email Microsoft Accounts – Text Message or Email Yahoo! – Text Message Wordpress – Google Authenticator
  • 24. What is a strong password ?? • • • • 12 Characters Not a Dictionary Word No Personal Information Use Upper and lower case letters, numbers and symbols
  • 25. F-Secure Key – Password Manager Built with Security in Mind Completely anonymous- even F-Secure cannot identify who you are/what is your data Multiple layers of protection – Data is „encrypted‟ securely. Works on PC‟s, Macs and Tablets
  • 26. F-Secure Mobile Apps Best Protection for your Android Device Anti Theft Anti Malware Browsing Protection Parental Control Safe Contacts F-Secure Lokki Personal Location tracking for family and friends F-Secure App Permissions One app to reveal them all Displays the permissions for all the apps on your phone. For example, see apps that can cost you money or drain your battery
  • 27. F-Secure Mobile Apps – Coming Soon Security in the Cloud Tracking Protection Virus Protection Browsing Protection Connection Protection Virtual Location Sign up for early access at http://freedome.f-secure.com Cloud Storage - It's your stuff. Not theirs. We believe in people‟s right to privacy. No spying. No backdoors. Access Everything, everywhere. Access your content from Facebook, Picasa Younited for Business – Collaborate and share Sign up for early access at www.younited.com
  • 28. Questions ?? Next Webinar – January 15th 2014 (11am) Securing Virtual and Cloud Environments Register now at http://bit.ly/fswebinar3
  • 29. Save the Date Securing Virtual and Cloud environments Wednesday 15 January @ 11:00-11:45 Why SMBs are outsourcing Security to Managed Service Providers Wednesday 12 February @ 11:00-11:45 It’s time for business to secure their mobile phones and tablets Wednesday 12 March @ 11:00-11:45

Editor's Notes

  • #5: We have been awarded Best Protection..
  • #6: But why should you use F-Secure to protect your customers?We have been endorsed by Forrester….
  • #7: Let’s look at the detail of our security offering…
  • #9: Lee Miles, deputy head of the National Cyber Crime Unit, says: "The NCA are actively pursuing organized crime groups committing this type of crime. We are working in co-operation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public."
  • #16: 2012 – LinkedIn – 6.5 million passwordsThe stolen passwords, which were in an encrypted format, were decrypted and posted on a Russian password decryption forum later on that day. By the morning of June 6, passwords for thousands of accounts were available online in plain text.The attack occurred between April 17 and April 19, 2011,forcing Sony to turn off the PlayStation Network on April 20. On May 4 Sony confirmed that personally identifiable information from each of the 77 million accounts appeared to have been stolen. Credit card data was encrypted, but Sony admitted that other user information was not encrypted at the time of the intrusion (including passwords)
  • #17: 123456 - 5% of the passwords
  • #19: Basic Encryption - The problem is, the key is often stored on the very same server that the passwords are, so if the servers get hacked, a hacker doesn't have to do much work to decrypt all the passwords, which means this method is still wildly insecure.unlike encryption, hashing is a one way street: If you have the hash, you can't run the algorithm backwards to get the original password. However, you can try different paswords until the hashes match. Rainbow tables are made up of passwords that have already been tested against hashes, which means the really weak ones will be cracked very quickly. Their biggest weakness, however, isn't complexity, but length. You're better off using a very long password rather than a short, complex one (like kj$fsDl#). Salt - It uses a different salt for each password, and even if the salts are stored on the same servers, it will make it very hard to find those salted hashes in the rainbow tables, since each one is long, complex, and unique. LinkedIn is famous for not using salted hashes, which brought them under a lot of scrutiny after their recent hack—had they used salts, their users would have been safer. Adding a salt in itself does not make hacking harder. Instead, it makes the procedure longer.Slow hash. Bcrypt - By using a slower hash—like the bcrypt algorithm—brute force attacks take much, much longer, since each password takes more time to compute.
  • #24: Google Authenticator, text message or email.Apple – Find my iPhone NotificationMicrosoft covers the Xbox
  • #28: Freedome – Android first,ioS 7 coming, PC and MacWindows Phone doesn’t support VPN