Contact Us




Change Locale

Are you protected from password security breaches?

From the experts | Posted on August 7, 2014 by Matthew Thiffault

There have been a lot of headlines in the news recently about password security breaches.

From “Russian Hackers Amass Over a Billion Internet Passwords” to “Stolen Passwords at Core of Breach”, or “New Vulnerabilities Expose User Passwords for Sites You Use.”, you should be alarmed.

We live our lives online. We work, shop, communicate, bank, socialize, store data, share files over the Internet. Pretty much everything we do, we are putting ourselves out there. As interesting as it would be to pack it all up, move to the mountains, install solar everything, and live off the grid, it’s just not an option for most of us.

So what can you do?

A simple solution is to use multi-factor authentication, also known as two-factor authentication. Now it’s not foolproof, but it’s a step in the right direction.

Two-factor authentication requires the use of two of the three independent authentication factors:

  1. Something you know, like a password or a PIN.
  2. Something you have, like an ATM card, smart card or a key FOB.
  3. Something you are, a biometric characteristic like a fingerprint or retinal scan.

The most common authentication that you probably see is a username and password in combination with a code that expires or is only used once, like an SMS message or a FOB


Personal Accounts

Some two-factor options are already available for popular personal accounts people use every day, like Facebook, Twitter and Google, such as Google Authenticator.

googleImplementing this on your personal accounts is easy and can stop others from logging in from systems that you don’t use. If your credentials are stolen, two-factor authentication options make it harder for hackers to actually gain access. You can set up Google two-factor authentication (or, as Google calls it, 2-Step Verification) by following these steps.

You can also check out this website, which lists organizations that offer two-factor authentication. For organizations that don’t offer it, the site shows you how to help entice them to set it up. They also have links on how to set up two-factor authentication for the services that you use.

Corporate Accounts

For corporate accounts, there are several companies that can help with your internal authentication, like Safenet. Whether you are trying to secure cloud applications, cloud services or private networks, Safenet can help through Safenet authentication services. They can also provide hard and soft tokens to fit any environment, which can integrate with most systems and complement others.

Solution Architects at Softchoice are experienced with all types of vendors and methods to protect your networks, users and customers. Feel free to reach out to your Softchoice account manager to set up an appointment to talk about ways to better protect your environments.

Related Posts

Assessing the challenges of your cloud computing journey Chicken and eggs and clouds (Oh my)  If your organization isn’t already dipping its toes into the cloud, it inevitably will in 2012. Quicker speed to market, univ...
What we do As a leading North American provider of technology solutions and services, Softchoice combines the efficiency and reliability of a national IT supplier with the personal tou...
Virtualization in Linux environments: The Penguin wants to play. While it’s true almost everyone is gung-ho about the benefits of virtualization these days, many organizations end up missing the boat on maximizing its greatest benefits – in...

Related Articles

Culture | July 5, 2019 by Alex Macks

As an organization that strives towards gender balance, Softchoice took part in a recent weeklong boot camp for women in tech sales in partnership with Talent Minded and The Revenue U.

Culture | July 5, 2019 by Alex Macks

The Softchoice co-op program enables students to gain hands-on experience across a variety of fields. I recently had the opportunity to talk to one of the co-op students about her experience at Softchoice.

Microsoft | June 20, 2019 by Susana Byun

Learn how the Microsoft Cloud Solution Provider (CSP) program helps partners add value while their customers gain flexibility Editor’s note (June 2019): We updated this post to reflect the latest CSP news and Softchoice webinar which can be viewed below.  Technology acquisition continues to evolve – away from physically owned infrastructure and towards cloud subscription […]