Kappa Journal Post-Conclave Issue (Fall 2017)

KAPPA COMMENTARY: INFORMATION TECHNOLOGY AND CYBERSECURITY

So, I have compiled a list of some of the best password management apps currently available. Then go through and start upgrading those passwords so that each is a different, random collection of characters. The software should help you by generating those new passwords for you. Dashlane 4 (I use this one): It’s hard to believe, but Dashlane 4 is even slicker and easier to use than its predecessor. It fully supports seven languages now, and can automatically change passwords on 500 websites. It gets five stars because you have a desktop version and an app that syncs passwords across platforms. RoboForm 8 Everywhere: RoboForm 8 Everywhere adds new features like digital inheritance and secure file sharing to the venerable Ro- boForm’s password management and form filling capabilities, but it hasn’t quite caught up with the top products. Zoho Vault: Zoho Vault does everything a password manager must, though it lacks form filling and has a few other minor limitations. If you don’t need multi-user features, you can use it for free. Sticky Password Premium: Sticky Password Premium does every- thing you’d expect from a password manager and more. If you choose the unusual no-cloud Wi-Fi sync, your passwords never leave your home network.      LastPass 4.0 Premium: Last- Pass 4.0 Premium builds on the excel- lent free version’s features, adding enhanced multifactor authentication, application password management, and password sharing groups. LogMeOnce Password Man- agement Suite Ultimate 5.2: With innovative features like selfie-based two-factor authentication and built- in anti-theft, LogMeOnce Password Management Suite Ultimate 5.2 is the 

most feature-rich password manager around.

followed by a logical password or personal identification number (PIN). The security procedure for an ATM machine is a common example of two- factor authentication, which requires that a user possess a valid ATM card and PIN. I use this religiously for Face- book, Twitter, my Apple ID, and the majority of my website accounts and I would strongly suggest that you use this simple method of securing your Internet browsing where you need two forms of ID to be granted access just in case you are ever the victim of a security breach of your passwords or PII.

Finally, I would like to leave you with one of the best security mea- sures available and that is two-factor authentication which is a security mechanism that requires two types of credentials for authentication and is designed to provide an additional layer of validation, minimizing security breaches. Two-factor authentication works with two separate security or validation mechanisms. Typically, one is a physical validation token, and one is a logical code or password. Both must be validated before accessing a secured service or product. Generally, an authenticating procedure requires a physical token or identity validation,

212 |  FALL 2017  THE JOURNAL

Publishing achievement for more than 100 years

Made with FlippingBook Online newsletter