June 11, 2014 By Jeff Crume 3 min read

“Reduce, reuse, recycle” is the mantra of the green movement. In fact, that slogan is itself really just a recycling, as it were, of the old adage “waste not, want not.” It makes sense: Reducing waste, reusing items or recycling things that are no longer useful in their current form conserves both natural resources — which don’t have to be harvested or mined — and limited landfill space.

But are there things for which this thrifty mindset doesn’t work? Yes — passwords.

While reducing, reusing and recycling passwords across multiple sites makes them a lot easier to keep up with, it also makes accounts a lot easier to hack. In fact, it reduces your overall security to the level of the most insecure system the password is used on, since a breach on one site effectively rends all the others using the same credentials vulnerable as well.

This means that if an attacker steals your password for a site on which you have no sensitive information stored and, as a result, security was an afterthought both for you and the site administrators, that attacker also has the key to potentially unlock all the other sites you use, including the ones where your most valuable data is stored. If that data happens to be credit card numbers, identity information or corporate secrets, things could get very bad in a hurry.

The Danger Is Real

Apparently, the breach resulted from — you guessed it — reuse of passwords across multiple sites. Apple responded by advising affected users to “change their Apple ID password as soon as possible and avoid using the same user name and password for multiple services.”

This is good advice even if you haven’t been hacked. In fact, it’s even better advice to use before you are hacked to prevent damage in the first place.

Lock Down Passwords with SSO

So how can you maintain passwords that are:

  • Unique for each system;
  • Hard to guess (which usually makes them hard to remember); and
  • Changed frequently?

Either develop a superpower to remember random details or use a single sign-on (SSO) tool to manage all the minutiae. Since the latter is easier to acquire than the former, I’d opt for that alternative. The SSO tool can reduce the password problem to a manageable size by giving you a single master key to unlock the vault of unique passwords it has generated for you for each site and not reuse or recycle existing credentials. This approach contains the damage of a breach on one system to only that system and prevents the sort of cascading failure that presumably was at the source of all the locked iPhones.

If you’re concerned that the SSO tool could be hacked, then use two-factor authentication to lock it down so that an attacker would have to not only steal your master password, but also your security token, mobile phone or fingerprint as well. While not impossible, it certainly makes things more difficult for the bad guys, and that’s the goal.

Also, don’t overlook the fact that this may be the only security enhancement you will ever implement that will actually improve the accessibility and usability of your system, since the SSO tool will not only manage all your unique, random, constantly changing passwords, it will actually type them in for you automatically so typos during log-on become a thing of the past.

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today