Contact us today!

FRS Pros Blog

Is It Safe to Have Your Browser Remember Your Passwords?

Is It Safe to Have Your Browser Remember Your Passwords?

Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you.

While yes, the fact that we no longer have to remember each different password for our online accounts may seem ideal, relying on the browser to remember them for us presents a few issues. Each of these browsers leaves some kind of opening for a hacker to review a user’s list of passwords.

Google Chrome - When a user is logged into their Google account, Chrome will automatically save any passwords that user inputs. If a hacker was then able to gain access to that Google account, the entire list of passwords would be available to them.

Mozilla Firefox - Utilizing low-level encryption, Firefox hides a user’s passwords, utilizing a single master password as the encryption key. However, because this encryption has such a low level, a brute force attack can break it. Plus, if someone is in possession of the device itself, they can access the passwords without having to log in.

Safari - Just as is the case with Firefox, Safari stores all passwords in the browser’s settings, where they can be accessed without a login required.

Internet Explorer - When Internet Explorer saves passwords, all it takes to expose them is a readily available tool.

Microsoft Edge - Edge has had some security issues, such as a flaw that enabled hackers to read files that were browser-compatible (like the notepad files that some might keep a list of passwords in). In addition, some third-party password managers, like Edge Password Manager, have failed to require password authentication in the past.

Of course, there are other threats to your password security as well. For instance, a bug that dates back 11 years was discovered early this year that allowed website credentials to be stolen. A secondary form was hidden behind the login form, stealing usernames (which were often just the user’s email) and passwords without the user having any idea.

What Can Be Done?
Your first step should be to disable your preferred browser’s built-in password manager.

Google Chrome - Under the toolbar, select Chrome Menu, and from there, Settings. Scroll down until you can select Advanced, and from there, select Manage passwords (found under Passwords and forms). Finally, switch Auto Sign-in to off.

Mozilla Firefox - In the toolbar’s Firefox Menu, access Options. On the left, access Privacy & Security, and find Forms & Passwords. Find the Remember logins and passwords for websites option and deselect it.

Safari - Select Safari Menu from the toolbar, and then select Preferences and Autofill. Then you’ll need to deselect Using info from my Address Book card, Usernames and passwords, and Other forms.

Internet Explorer - First, you need to reconsider utilizing Internet Explorer, assuming your organization gives you a choice in the matter. If you must, you will want to access the toolbar’s Internet Explorer Menu and select Internet Options. From there, click into Content, and select Settings (found under AutoComplete). Deselect both Forms and Searches and User names and passwords on forms. Finally, save your changes by clicking OK.

Microsoft Edge - Again, from the toolbar, select Edge Menu and from there, Settings. Scroll down to find View advanced settings. Under Privacy and services, deactivate Offer to save passwords, and under Manage passwords, deactivate Save from entries.

We understand, remembering all of your different passwords can be a real pain, but relying on your browser to remember them just isn’t a good option. There are, however, services like LastPass that can store your passwords much more safely behind much more powerful encryption. While these solutions aren’t infallible either, they are a much better choice than entrusting your browser.

For more help managing your business IT and its security, give FRS Pros a call at 561-795-2000.

Getting to Know Technology: Breadcrumbs
Here Is a List of this Year’s Most Devastating Hac...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Business Management Tech Term Google Business Computing Cloud User Tips Software Hackers Hardware Browser Malware Computer Mobile Devices Windows Cybersecurity Efficiency Microsoft Hosted Solutions Data Backup Innovation Cybercrime Productivity Smartphone Apps Android Windows 10 IT Services Data Recovery Smartphones Data Security Operating System Outsourced IT Internet of Things Data Mobile Device Management Business Money Backup Office 365 Vulnerability Alert Business Continuity Email Law Enforcement Ransomware Upgrade Phishing IT Support VoIP Best Practice Communications Microsoft Office Managed IT Services Collaboration Disaster Recovery Saving Money Network IT Support Server Chrome App Cloud Computing Spam Small Business Information Technology Passwords Information Windows 10 Blockchain Computers Virtualization Two-factor Authentication Employer-Employee Relationship Router Managed Service Provider Applications Managed IT Telephone Systems Google Drive Gadgets Unsupported Software Tech Support WannaCry Commerce Application Automation Google Docs Project Management Communication Password Patch Management Wireless Charging Artificial Intelligence Safety Devices Proactive IT Government SaaS Hacking Holiday Data Breach Managed Service Gmail Risk Management Robot Touchscreen Data Storage Bring Your Own Device Save Money WiFi Travel Mobile Security Miscellaneous Mobile Device OneNote Excel The Internet of Things Social Media Fraud Google Assistant Wi-Fi VPN iPhone Audit Budget Update Data Protection Shortcut Wireless Technology Politics Facebook User Error Data Management Workplace Tips BDR Quick Tips Cortana Hosted Solution Productivity Cost Management Managed IT Services Networking Users Avoiding Downtime Sports Augmented Reality Laptop Conferencing Data Theft Virtual Assistant Transportation Chromecast Word Device Security Hard Drive Display Telephony IT Solutions Legislation Language Memory Private Cloud Legal Adobe Workers Testing Internet Exlporer Webinar Encryption Computer Forensics Antivirus Bandwidth Chromebook Co-Managed Services Touchpad Gifts Computing Alexa for Business Going Green Social Consultant Windows Ink Uninterrupted Power Supply Comparison Financial Remote Monitoring Licensing Updates Camera IT solutions Microsoft Excel IT budget Management Outlook Google Maps Spyware Printing Telephone Humor Credit Cards App store Emergency iOS WIndows Server 2008 Point of Sale Specifications Virus Microsoft Word Projects DDoS Windows 10s HBO File Sharing PowerPoint Files Vendor Apple Hyperlink Disaster Computer Care Nanotechnology Identity Theft Recovery Screen Mirroring Sales Proactive Hybrid Cloud Reputation Unified Threat Management Tablets Maintenance Identity Solid State Drive Storage Social Engineering Wireless Internet History Meetings Sync Evernote Employee-Employer Relationship Data storage Edge Value Root Cause Analysis Vendor Management FAQ Remote Computing Health Administrator Emails Cast Lithium-ion battery Computer Fan Scam Retail Websites Amazon Streaming Media Upgrades NFL eWaste Data Privacy Windows 7 Hard Disk Drive IT Management Identities Gamification Wireless Business Technology Settings BYOD Data Loss Ciminal Mobility Samsung Charger Software as a Service Search Access Marketing Office tips Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Congratulations Benefits Cache Phone System Advertising Save Time Peripheral Training Monitors Computer Accessories Battery Smart Technology Flexibility Music Instant Messaging Hacker HaaS Television CrashOverride End of Support Company Culture Relocation Scalability Analytics Keyboard Personal Information Entertainment es Cleaning Compliance Black Market PDF Automobile Office Big Data Printers Managing Stress Mobile Computing USB Worker Wasting Time Regulation Text Messaging How To Books Thank You Education Hiring/Firing Video Games Experience Virtual Reality Twitter Accessory Work/Life Balance