Creating better passwords (that users can actually remember)

Just about every day there’s a news story that the age of passwords is almost over. Something – anything – more secure and easier to use is about to replace them once and for all. We won’t hold our breath. 

Were malicious insiders to blame for Sony hack?

Warning: The following article (unlike many talking heads) doesn’t purport to know who or what was behind the attack on Sony Pictures. But some are starting to wonder whether the hack was actually state-sponsored or just the handiwork of disgruntled former employees. 

The Top 10 tech stories of 2014

Before we look ahead to next year’s challenges and promising developments, let’s take a look back at 2014’s biggest headlines.

Problems with passwords: Users hate them, can’t remember them

A new survey highlights several problems with passwords: They’re forgettable, inefficient and users would rather listen to “The Macarena” than put up with them. (No, seriously. They would.)

Sharing, not caring: Users pass around credentials

One of the most basic security mistakes out there is sharing account credentials and passwords. A new study finds many users are guilty of it – and plenty don’t even realize it’s a security risk.

Study: Password managers could make hackers’ jobs easier

We all know the problems with passwords: Good ones are difficult to remember and shouldn’t be repeated. But one of the best solutions around this problem often results in more problems, according to a recent report. 

Poor password policies are killing companies: 10 ways to fix it

A recent survey shows that when it comes to password policies and revoking credentials, many companies are getting a failing grade – and some of the worst offenders out there are in the IT department.

Smartphone hack could bypass passcodes

The  lines between old-fashioned hacking attacks and the kinds of high-tech, complicated code-cracking you might see in a “Mission Impossible” movie are starting to blur. And it’s a good reminder of why users should be practicing some basic rules on protecting smartphones. 

How to take charge of access management

Security is often made out to be much more complicated than it needs to be. Much of it boils down to a simple premise: making sure that only the right people have access to only the right data. 

The top 10 tech stories of 2013

It’s been a busy year for IT pros. And next year isn’t shaping up to be much better.