SlideShare a Scribd company logo
1
Conquering The Password
Headache…
Invenio Advisors, LLC
Don Tomoff, CPA, MBA
December 2013
2Invenio Advisors, LLC – Don Tomoff
Disclaimer
Password management is a broad concept
and there are a variety of ways to handle
passwords and maintain security.
Outlined in this presentation is only one
approach that I use - and recommend - to
meet the password management objectives
outlined.
3Invenio Advisors, LLC – Don Tomoff
Password Problem?
Check out video – does this sound familiar?
TAP
Image
to
Play
4Invenio Advisors, LLC – Don Tomoff
Password Problem?
Interesting statistics…
Source: https://lastpass.com
5Invenio Advisors, LLC – Don Tomoff
Problem Hypothesis
Individuals have a difficult time
creating and managing complex,
secure passwords
6Invenio Advisors, LLC – Don Tomoff
Fast Company Article
“Feeling Insecure? Because Your Passwords
Are” November 12, 2013
• “Adobe announced hackers had nabbed the account information of
2.9 million customers…then adjusted it to 38 million…”
• “…turns out that people are often loonily lackadasical with their
passwords.”
• “Additionally, some Adobe users had the gumption to use sensitive
information as their password or hint.” (e.g., social security number)
7Invenio Advisors, LLC – Don Tomoff
Fast Company Article
“The 10 Biggest Password Mistakes People
Make” November 27, 2013
• “Using any of the following terms is like locking your bank vault with
masking tape and good intentions ...”
• #7 –“LetMeIn… Even sticking a "please" on the end would make it
at least somewhat hard, just from the act of adding more letters.”
• #5 - “Swear Words…Unfortunately, by doing this, you're choosing
the first words that are going to pop into someone's head as soon
as they get pissed off that they can't figure out your password.”
• #1 – “Password” – “It's one step above just leaving your computer
sitting unattended on a busy city sidewalk.”
8Invenio Advisors, LLC – Don Tomoff
Secure
NOT
Secure
Convenient NOT Convenient
This is the password conundrum...
9Invenio Advisors, LLC – Don Tomoff
Secure
NOT
Secure
Convenient NOT Convenient
Current state may look like this...
10Invenio Advisors, LLC – Don Tomoff
Secure
NOT
Secure
Convenient NOT Convenient
Challenge is to do this ..
11Invenio Advisors, LLC – Don Tomoff
Password Management
Increasing Security and Reducing Your Headaches
iCloud Keychain
KeePass/KyPass
12Invenio Advisors, LLC – Don Tomoff
Password Management Objectives
Manage and access from any platform or
device ("anytime, anywhere")
Increase password complexity (character
mix, length, and no repeating passwords)
Eliminate the need to remember or
manually key your password
13Invenio Advisors, LLC – Don Tomoff
One Example - Dropbox
Password (ok, not really!)
L&@"2&!b,8s)0Zm,D^Vvl,uKI
What’s the point?
14Invenio Advisors, LLC – Don Tomoff
Password Tools
iCloud Keychain
Meldium
Password "Safe“ (many options, here’s two)
KeePass/KyPass
LastPass
15Invenio Advisors, LLC – Don Tomoff
Three Tools - Coverage
Tool Mobile / PC Comments
iCloud Keychain Mobile Just memorizes and works
– not all passwords (no
user interaction)
Meldium PC Use at your desk
(browser). “One-click”
access to only cloud
services.
Password Safe
(KeePass/KyPass)
• Also, LastPass &
1Password
Mobile/PC Everything – requires user
interaction (however,
enables no memory or re-
keying efforts)
16Invenio Advisors, LLC – Don Tomoff
Three Tools - Coverage
Amount of Effort?
Tool Mobile / PC Keep a List Tool
iCloud
Keychain
Mobile Access,
lookup,
manually enter
None
Meldium PC Access,
lookup,
manually enter
One-click
Password
Safe
(KeePass /
KyPass)
Mobile/PC Access,
lookup,
manually enter
Access,
lookup, copy-
paste
19Invenio Advisors, LLC – Don Tomoff
Passwords Across Devices
Meldium
KeePass
iCloud KeyChain
KyPass
iCloud KeyChain
KyPass
20Invenio Advisors, LLC – Don Tomoff
iCloud Keychain
iCloud Keychain stores your usernames,
passwords, Wi-Fi networks, and credit
card information so that you can easily fill
in forms or logins whenever you need.
This will sync across Safari and with third
party apps that support iCloud Keychain.
Your information is securely protected
using 256-bit AES encryption.
iCloud Keychain also includes a powerful
password generator.
21Invenio Advisors, LLC – Don Tomoff
Intro to iCloud Keychain
22Invenio Advisors, LLC – Don Tomoff
iCloud Keychain Resources
iCloud – FAQ (Apple Support site)
Apple’s iCloud Keychain: It Works, but with Frustrating Limitations
How to access and view your iCloud KeyChain passwords with
iOS7
iCloud Keychain: Everything You need to know and How to set it
up
How to use iCloud KeyChain
How to add credit card information to iCloud KeyChain
23Invenio Advisors, LLC – Don Tomoff
Meldium
More than just another password manager. It
automatically logs you in to your favorite apps
and web sites without typing usernames and
passwords. You get instant access with
extensions for Chrome and Firefox.
Enables your team to share access to apps
without sharing passwords. Protect your
company from phishing attacks and use
strong passwords on all your services.
When you sign in with Google, Meldium
automatically extends its secure two-factor
authentication (2FA) to all your apps.
24Invenio Advisors, LLC – Don Tomoff
Meldium Dashboard
25Invenio Advisors, LLC – Don Tomoff
Meldium Pricing
26Invenio Advisors, LLC – Don Tomoff
Meldium Resources
Home page – www.meldium.com
Meldium blog page
Ditch the Spreadsheet. Meldium Controls
Your Team’s Shared App Passwords For
You
Meldium – Instant Access to Apps
27Invenio Advisors, LLC – Don Tomoff
KeePass & KyPass
Password "safe" - Windows PC
software and compatible app for
mobile devices
"A secure, lengthy, completely
random password goes a long way
towards improving your security–
and having a separate password for
each and every website and service
you use is the single most important
thing you can do to keep secure."
KeePass/KyPass
28Invenio Advisors, LLC – Don Tomoff
KeePass – Master Signon
29Invenio Advisors, LLC – Don Tomoff
KeePass – Desktop View
30Invenio Advisors, LLC – Don Tomoff
KyPass - iPad
31Invenio Advisors, LLC – Don Tomoff
KyPass - iPad
32Invenio Advisors, LLC – Don Tomoff
KyPass - iPhone
33Invenio Advisors, LLC – Don Tomoff
LastPass –
Browser based password safe
TAP
Image
to Access
34Invenio Advisors, LLC – Don Tomoff
Password Safe Resources
KeePass Password Safe – info home page
Keepass: free and open-source password manager
Review: KeePass makes strong passwords and keeps them safe
Review: LastPass takes your passwords to the cloud
1Password vs Lastpass vs KeePass (vs…..a bunch others)
1. Lists pros and cons of various password manager alternatives –
accumulated from Reddit.com posts
2. Definitely worth a review if you are unsure about what password safe you
want to use.
35Invenio Advisors, LLC – Don Tomoff
Contact Invenio Advisors
Don Tomoff, CPA, MBA
don@invenioadvisorsllc.com
LinkedIn Profile
Find Don on the Web
Download Business Card

More Related Content

What's hot

How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobileCarsonified Team
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
Wayne Caswell
 
Mobile Design for Instructional Designers
Mobile Design for Instructional DesignersMobile Design for Instructional Designers
Mobile Design for Instructional Designers
Brandon Carson
 
Apple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | ArmediaApple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | Armedia
Armedia LLC
 
Pragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignPragmatic Principles for Mobile Design
Pragmatic Principles for Mobile Design
Brandon Carson
 
Golden years of IT: Past Present and Future
Golden years of IT: Past Present and FutureGolden years of IT: Past Present and Future
Golden years of IT: Past Present and Future
Altaf Rehmani
 
State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10
Tim O'Reilly
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
Scott Burnett
 
Customer Service Gone Mobile
Customer Service Gone MobileCustomer Service Gone Mobile
Customer Service Gone Mobile
Sarena Fletcher
 
WITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendWITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile Trend
Bess Ho
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
Scott Burnett
 
iPhone - Human Interface Guidelines
iPhone - Human Interface GuidelinesiPhone - Human Interface Guidelines
iPhone - Human Interface Guidelines
Martin Ebner
 
Seeing Through The Clouds
Seeing Through The CloudsSeeing Through The Clouds
Seeing Through The Clouds
Atlas Cloud
 
Web 2.0 - Then And Now
Web 2.0 - Then And NowWeb 2.0 - Then And Now
Web 2.0 - Then And Now
Udayan Banerjee
 
Apps For Actuaries Presentation
Apps For Actuaries PresentationApps For Actuaries Presentation
Apps For Actuaries Presentation
Richard Junker
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
Scott Burnett
 
WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012
Bess Ho
 
Putting Web Into Native App
Putting Web Into Native AppPutting Web Into Native App
Putting Web Into Native AppBess Ho
 
What's Coming Coming Coming
What's Coming Coming ComingWhat's Coming Coming Coming
What's Coming Coming Coming
Luis Diego González-Zúñiga, PhD
 
State of the Internet Operating System
State of the Internet Operating SystemState of the Internet Operating System
State of the Internet Operating System
Tim O'Reilly
 

What's hot (20)

How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobile
 
Lifted by the Cloud
Lifted by the CloudLifted by the Cloud
Lifted by the Cloud
 
Mobile Design for Instructional Designers
Mobile Design for Instructional DesignersMobile Design for Instructional Designers
Mobile Design for Instructional Designers
 
Apple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | ArmediaApple iPad Publishing Best Practices | Jim Nasr | Armedia
Apple iPad Publishing Best Practices | Jim Nasr | Armedia
 
Pragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignPragmatic Principles for Mobile Design
Pragmatic Principles for Mobile Design
 
Golden years of IT: Past Present and Future
Golden years of IT: Past Present and FutureGolden years of IT: Past Present and Future
Golden years of IT: Past Present and Future
 
State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10State of the Internet Operating System: Web2 expo10
State of the Internet Operating System: Web2 expo10
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 
Customer Service Gone Mobile
Customer Service Gone MobileCustomer Service Gone Mobile
Customer Service Gone Mobile
 
WITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile TrendWITI Summit 2013 Mobile Trend
WITI Summit 2013 Mobile Trend
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
 
iPhone - Human Interface Guidelines
iPhone - Human Interface GuidelinesiPhone - Human Interface Guidelines
iPhone - Human Interface Guidelines
 
Seeing Through The Clouds
Seeing Through The CloudsSeeing Through The Clouds
Seeing Through The Clouds
 
Web 2.0 - Then And Now
Web 2.0 - Then And NowWeb 2.0 - Then And Now
Web 2.0 - Then And Now
 
Apps For Actuaries Presentation
Apps For Actuaries PresentationApps For Actuaries Presentation
Apps For Actuaries Presentation
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
 
WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012WITI.ORG Women Technology Summit 2012
WITI.ORG Women Technology Summit 2012
 
Putting Web Into Native App
Putting Web Into Native AppPutting Web Into Native App
Putting Web Into Native App
 
What's Coming Coming Coming
What's Coming Coming ComingWhat's Coming Coming Coming
What's Coming Coming Coming
 
State of the Internet Operating System
State of the Internet Operating SystemState of the Internet Operating System
State of the Internet Operating System
 

Similar to Invenio Conquer-Password-Mgmt

Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
Joan Dembowski
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
Bunmi Sowande
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
Khalil Jubran
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011
John Mayfield
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRB
John Mayfield
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
morisson
 
Giant bags of mostly water
Giant bags of mostly waterGiant bags of mostly water
Giant bags of mostly water
roensel
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
n|u - The Open Security Community
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Security Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an EnablerSecurity Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an Enabler
Nordic APIs
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
Shawn Tuma
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10
iphonepentest
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
pcsafe
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
Yury Chemerkin
 
Db2z bp security_transcript
Db2z bp security_transcriptDb2z bp security_transcript
Db2z bp security_transcript
César Medina Corona
 

Similar to Invenio Conquer-Password-Mgmt (20)

Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRB
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
Giant bags of mostly water
Giant bags of mostly waterGiant bags of mostly water
Giant bags of mostly water
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Security Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an EnablerSecurity Is a Concern, Let’s Make It an Enabler
Security Is a Concern, Let’s Make It an Enabler
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
Beyond the OWASP Top 10
Beyond the OWASP Top 10Beyond the OWASP Top 10
Beyond the OWASP Top 10
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Db2z bp security_transcript
Db2z bp security_transcriptDb2z bp security_transcript
Db2z bp security_transcript
 

More from Invenio Advisors, LLC

Tip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdfTip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdf
Invenio Advisors, LLC
 
Creating a To Done list Process using Evernote
Creating a To Done list Process using EvernoteCreating a To Done list Process using Evernote
Creating a To Done list Process using Evernote
Invenio Advisors, LLC
 
PowerQuery Can Do That!
PowerQuery Can Do That!PowerQuery Can Do That!
PowerQuery Can Do That!
Invenio Advisors, LLC
 
2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernote2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernote
Invenio Advisors, LLC
 
2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tips2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tips
Invenio Advisors, LLC
 
2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)
Invenio Advisors, LLC
 
2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business Professional2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business Professional
Invenio Advisors, LLC
 
Five Excel Productivity Hacks
Five Excel Productivity HacksFive Excel Productivity Hacks
Five Excel Productivity Hacks
Invenio Advisors, LLC
 
2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-Pres2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-Pres
Invenio Advisors, LLC
 
Getting LinkedIn - 2014
Getting LinkedIn - 2014Getting LinkedIn - 2014
Getting LinkedIn - 2014
Invenio Advisors, LLC
 
Accounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and TechnologyAccounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and Technology
Invenio Advisors, LLC
 
2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-Newsreader2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-Newsreader
Invenio Advisors, LLC
 
Invenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader TrainingInvenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader Training
Invenio Advisors, LLC
 
SWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-DisruptionSWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-Disruption
Invenio Advisors, LLC
 
So You Know Excel Pivot Tables?
So You Know Excel Pivot Tables?So You Know Excel Pivot Tables?
So You Know Excel Pivot Tables?
Invenio Advisors, LLC
 
2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare
Invenio Advisors, LLC
 
Don Tomoff Linkedin_profile
Don Tomoff Linkedin_profileDon Tomoff Linkedin_profile
Don Tomoff Linkedin_profile
Invenio Advisors, LLC
 
Invenio executive dashboards - considerations
Invenio executive dashboards - considerationsInvenio executive dashboards - considerations
Invenio executive dashboards - considerations
Invenio Advisors, LLC
 
Invenio advisors overview
Invenio advisors overviewInvenio advisors overview
Invenio advisors overview
Invenio Advisors, LLC
 

More from Invenio Advisors, LLC (19)

Tip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdfTip-Create GoogleDrive Content List_FINAL.pdf
Tip-Create GoogleDrive Content List_FINAL.pdf
 
Creating a To Done list Process using Evernote
Creating a To Done list Process using EvernoteCreating a To Done list Process using Evernote
Creating a To Done list Process using Evernote
 
PowerQuery Can Do That!
PowerQuery Can Do That!PowerQuery Can Do That!
PowerQuery Can Do That!
 
2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernote2021 0125 tip in_a_minute_02_evernote
2021 0125 tip in_a_minute_02_evernote
 
2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tips2019 11 Excel Conditional Formatting tips
2019 11 Excel Conditional Formatting tips
 
2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)2016 0921 IMA MO-Stand-Out (Handout)
2016 0921 IMA MO-Stand-Out (Handout)
 
2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business Professional2016 05 Snapchat for the Business Professional
2016 05 Snapchat for the Business Professional
 
Five Excel Productivity Hacks
Five Excel Productivity HacksFive Excel Productivity Hacks
Five Excel Productivity Hacks
 
2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-Pres2014 10 INVENIO-Google Calendar-Pres
2014 10 INVENIO-Google Calendar-Pres
 
Getting LinkedIn - 2014
Getting LinkedIn - 2014Getting LinkedIn - 2014
Getting LinkedIn - 2014
 
Accounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and TechnologyAccounting Industry Disruption - Trends and Technology
Accounting Industry Disruption - Trends and Technology
 
2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-Newsreader2014 03 Google Docs-Custom-Newsreader
2014 03 Google Docs-Custom-Newsreader
 
Invenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader TrainingInvenio iPad Content Management Goodreader Training
Invenio iPad Content Management Goodreader Training
 
SWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-DisruptionSWFG-SmallBusinessForum-Digital-Disruption
SWFG-SmallBusinessForum-Digital-Disruption
 
So You Know Excel Pivot Tables?
So You Know Excel Pivot Tables?So You Know Excel Pivot Tables?
So You Know Excel Pivot Tables?
 
2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare
 
Don Tomoff Linkedin_profile
Don Tomoff Linkedin_profileDon Tomoff Linkedin_profile
Don Tomoff Linkedin_profile
 
Invenio executive dashboards - considerations
Invenio executive dashboards - considerationsInvenio executive dashboards - considerations
Invenio executive dashboards - considerations
 
Invenio advisors overview
Invenio advisors overviewInvenio advisors overview
Invenio advisors overview
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Invenio Conquer-Password-Mgmt

  • 1. 1 Conquering The Password Headache… Invenio Advisors, LLC Don Tomoff, CPA, MBA December 2013
  • 2. 2Invenio Advisors, LLC – Don Tomoff Disclaimer Password management is a broad concept and there are a variety of ways to handle passwords and maintain security. Outlined in this presentation is only one approach that I use - and recommend - to meet the password management objectives outlined.
  • 3. 3Invenio Advisors, LLC – Don Tomoff Password Problem? Check out video – does this sound familiar? TAP Image to Play
  • 4. 4Invenio Advisors, LLC – Don Tomoff Password Problem? Interesting statistics… Source: https://lastpass.com
  • 5. 5Invenio Advisors, LLC – Don Tomoff Problem Hypothesis Individuals have a difficult time creating and managing complex, secure passwords
  • 6. 6Invenio Advisors, LLC – Don Tomoff Fast Company Article “Feeling Insecure? Because Your Passwords Are” November 12, 2013 • “Adobe announced hackers had nabbed the account information of 2.9 million customers…then adjusted it to 38 million…” • “…turns out that people are often loonily lackadasical with their passwords.” • “Additionally, some Adobe users had the gumption to use sensitive information as their password or hint.” (e.g., social security number)
  • 7. 7Invenio Advisors, LLC – Don Tomoff Fast Company Article “The 10 Biggest Password Mistakes People Make” November 27, 2013 • “Using any of the following terms is like locking your bank vault with masking tape and good intentions ...” • #7 –“LetMeIn… Even sticking a "please" on the end would make it at least somewhat hard, just from the act of adding more letters.” • #5 - “Swear Words…Unfortunately, by doing this, you're choosing the first words that are going to pop into someone's head as soon as they get pissed off that they can't figure out your password.” • #1 – “Password” – “It's one step above just leaving your computer sitting unattended on a busy city sidewalk.”
  • 8. 8Invenio Advisors, LLC – Don Tomoff Secure NOT Secure Convenient NOT Convenient This is the password conundrum...
  • 9. 9Invenio Advisors, LLC – Don Tomoff Secure NOT Secure Convenient NOT Convenient Current state may look like this...
  • 10. 10Invenio Advisors, LLC – Don Tomoff Secure NOT Secure Convenient NOT Convenient Challenge is to do this ..
  • 11. 11Invenio Advisors, LLC – Don Tomoff Password Management Increasing Security and Reducing Your Headaches iCloud Keychain KeePass/KyPass
  • 12. 12Invenio Advisors, LLC – Don Tomoff Password Management Objectives Manage and access from any platform or device ("anytime, anywhere") Increase password complexity (character mix, length, and no repeating passwords) Eliminate the need to remember or manually key your password
  • 13. 13Invenio Advisors, LLC – Don Tomoff One Example - Dropbox Password (ok, not really!) L&@"2&!b,8s)0Zm,D^Vvl,uKI What’s the point?
  • 14. 14Invenio Advisors, LLC – Don Tomoff Password Tools iCloud Keychain Meldium Password "Safe“ (many options, here’s two) KeePass/KyPass LastPass
  • 15. 15Invenio Advisors, LLC – Don Tomoff Three Tools - Coverage Tool Mobile / PC Comments iCloud Keychain Mobile Just memorizes and works – not all passwords (no user interaction) Meldium PC Use at your desk (browser). “One-click” access to only cloud services. Password Safe (KeePass/KyPass) • Also, LastPass & 1Password Mobile/PC Everything – requires user interaction (however, enables no memory or re- keying efforts)
  • 16. 16Invenio Advisors, LLC – Don Tomoff Three Tools - Coverage Amount of Effort? Tool Mobile / PC Keep a List Tool iCloud Keychain Mobile Access, lookup, manually enter None Meldium PC Access, lookup, manually enter One-click Password Safe (KeePass / KyPass) Mobile/PC Access, lookup, manually enter Access, lookup, copy- paste
  • 17. 19Invenio Advisors, LLC – Don Tomoff Passwords Across Devices Meldium KeePass iCloud KeyChain KyPass iCloud KeyChain KyPass
  • 18. 20Invenio Advisors, LLC – Don Tomoff iCloud Keychain iCloud Keychain stores your usernames, passwords, Wi-Fi networks, and credit card information so that you can easily fill in forms or logins whenever you need. This will sync across Safari and with third party apps that support iCloud Keychain. Your information is securely protected using 256-bit AES encryption. iCloud Keychain also includes a powerful password generator.
  • 19. 21Invenio Advisors, LLC – Don Tomoff Intro to iCloud Keychain
  • 20. 22Invenio Advisors, LLC – Don Tomoff iCloud Keychain Resources iCloud – FAQ (Apple Support site) Apple’s iCloud Keychain: It Works, but with Frustrating Limitations How to access and view your iCloud KeyChain passwords with iOS7 iCloud Keychain: Everything You need to know and How to set it up How to use iCloud KeyChain How to add credit card information to iCloud KeyChain
  • 21. 23Invenio Advisors, LLC – Don Tomoff Meldium More than just another password manager. It automatically logs you in to your favorite apps and web sites without typing usernames and passwords. You get instant access with extensions for Chrome and Firefox. Enables your team to share access to apps without sharing passwords. Protect your company from phishing attacks and use strong passwords on all your services. When you sign in with Google, Meldium automatically extends its secure two-factor authentication (2FA) to all your apps.
  • 22. 24Invenio Advisors, LLC – Don Tomoff Meldium Dashboard
  • 23. 25Invenio Advisors, LLC – Don Tomoff Meldium Pricing
  • 24. 26Invenio Advisors, LLC – Don Tomoff Meldium Resources Home page – www.meldium.com Meldium blog page Ditch the Spreadsheet. Meldium Controls Your Team’s Shared App Passwords For You Meldium – Instant Access to Apps
  • 25. 27Invenio Advisors, LLC – Don Tomoff KeePass & KyPass Password "safe" - Windows PC software and compatible app for mobile devices "A secure, lengthy, completely random password goes a long way towards improving your security– and having a separate password for each and every website and service you use is the single most important thing you can do to keep secure." KeePass/KyPass
  • 26. 28Invenio Advisors, LLC – Don Tomoff KeePass – Master Signon
  • 27. 29Invenio Advisors, LLC – Don Tomoff KeePass – Desktop View
  • 28. 30Invenio Advisors, LLC – Don Tomoff KyPass - iPad
  • 29. 31Invenio Advisors, LLC – Don Tomoff KyPass - iPad
  • 30. 32Invenio Advisors, LLC – Don Tomoff KyPass - iPhone
  • 31. 33Invenio Advisors, LLC – Don Tomoff LastPass – Browser based password safe TAP Image to Access
  • 32. 34Invenio Advisors, LLC – Don Tomoff Password Safe Resources KeePass Password Safe – info home page Keepass: free and open-source password manager Review: KeePass makes strong passwords and keeps them safe Review: LastPass takes your passwords to the cloud 1Password vs Lastpass vs KeePass (vs…..a bunch others) 1. Lists pros and cons of various password manager alternatives – accumulated from Reddit.com posts 2. Definitely worth a review if you are unsure about what password safe you want to use.
  • 33. 35Invenio Advisors, LLC – Don Tomoff Contact Invenio Advisors Don Tomoff, CPA, MBA don@invenioadvisorsllc.com LinkedIn Profile Find Don on the Web Download Business Card