Contact us today!

FRS Pros Blog

Is It Safe to Have Your Browser Remember Your Passwords?

Is It Safe to Have Your Browser Remember Your Passwords?

Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you.

While yes, the fact that we no longer have to remember each different password for our online accounts may seem ideal, relying on the browser to remember them for us presents a few issues. Each of these browsers leaves some kind of opening for a hacker to review a user’s list of passwords.

Google Chrome - When a user is logged into their Google account, Chrome will automatically save any passwords that user inputs. If a hacker was then able to gain access to that Google account, the entire list of passwords would be available to them.

Mozilla Firefox - Utilizing low-level encryption, Firefox hides a user’s passwords, utilizing a single master password as the encryption key. However, because this encryption has such a low level, a brute force attack can break it. Plus, if someone is in possession of the device itself, they can access the passwords without having to log in.

Safari - Just as is the case with Firefox, Safari stores all passwords in the browser’s settings, where they can be accessed without a login required.

Internet Explorer - When Internet Explorer saves passwords, all it takes to expose them is a readily available tool.

Microsoft Edge - Edge has had some security issues, such as a flaw that enabled hackers to read files that were browser-compatible (like the notepad files that some might keep a list of passwords in). In addition, some third-party password managers, like Edge Password Manager, have failed to require password authentication in the past.

Of course, there are other threats to your password security as well. For instance, a bug that dates back 11 years was discovered early this year that allowed website credentials to be stolen. A secondary form was hidden behind the login form, stealing usernames (which were often just the user’s email) and passwords without the user having any idea.

What Can Be Done?
Your first step should be to disable your preferred browser’s built-in password manager.

Google Chrome - Under the toolbar, select Chrome Menu, and from there, Settings. Scroll down until you can select Advanced, and from there, select Manage passwords (found under Passwords and forms). Finally, switch Auto Sign-in to off.

Mozilla Firefox - In the toolbar’s Firefox Menu, access Options. On the left, access Privacy & Security, and find Forms & Passwords. Find the Remember logins and passwords for websites option and deselect it.

Safari - Select Safari Menu from the toolbar, and then select Preferences and Autofill. Then you’ll need to deselect Using info from my Address Book card, Usernames and passwords, and Other forms.

Internet Explorer - First, you need to reconsider utilizing Internet Explorer, assuming your organization gives you a choice in the matter. If you must, you will want to access the toolbar’s Internet Explorer Menu and select Internet Options. From there, click into Content, and select Settings (found under AutoComplete). Deselect both Forms and Searches and User names and passwords on forms. Finally, save your changes by clicking OK.

Microsoft Edge - Again, from the toolbar, select Edge Menu and from there, Settings. Scroll down to find View advanced settings. Under Privacy and services, deactivate Offer to save passwords, and under Manage passwords, deactivate Save from entries.

We understand, remembering all of your different passwords can be a real pain, but relying on your browser to remember them just isn’t a good option. There are, however, services like LastPass that can store your passwords much more safely behind much more powerful encryption. While these solutions aren’t infallible either, they are a much better choice than entrusting your browser.

For more help managing your business IT and its security, give FRS Pros a call at 561-795-2000.

Getting to Know Technology: Breadcrumbs
Here Is a List of this Year’s Most Devastating Hac...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Cloud Tech Term Google Business Management Business Computing Software User Tips Microsoft Computer Malware Hackers Hardware Browser Productivity Efficiency Mobile Devices Cybersecurity Windows Data Backup Hosted Solutions Apps Internet of Things Smartphone Innovation Cybercrime IT Services Data Recovery Data Security Smartphones Operating System Office 365 Outsourced IT Android Email Backup Windows 10 Mobile Device Management Data Business Money Vulnerability Upgrade Alert VoIP Law Enforcement Disaster Recovery Phishing Ransomware IT Support Business Continuity Saving Money IT Support Managed IT Services Collaboration Network Server Microsoft Office Best Practice Employer-Employee Relationship Applications Chrome Communications Cloud Computing Spam Computers Virtualization Information Technology Passwords Miscellaneous Telephone Systems Tech Support Gadgets Information Managed Service Provider Blockchain Router Two-factor Authentication Managed IT Unsupported Software Small Business Google Drive Windows 10 App Save Money Shortcut Networking Politics Cortana Communication Workplace Tips Proactive IT BDR Word SaaS Artificial Intelligence Budget Government Wireless Technology Users Patch Management Wireless Charging Google Docs Project Management Touchscreen Data Storage Robot Devices WiFi Data Management Application Mobile Device OneNote Productivity Encryption Data Breach The Internet of Things Social Media Safety Audit VPN iPhone Sports Data Protection Travel Managed Service Excel Facebook Holiday Bring Your Own Device Automation Risk Management Fraud Mobile Security Password Quick Tips Cost Management Managed IT Services Hosted Solution Evernote Augmented Reality Google Assistant Avoiding Downtime WannaCry Hacking Wi-Fi User Error Commerce Gmail Update Webinar Private Cloud Identities Value Wasting Time Files Charger Amazon DDoS Vendor Management Data Loss Ciminal Data Privacy Windows 7 Consultant Conferencing Data Theft Gamification Recovery Going Green Social Scam Device Security Business Technology Remote Monitoring Disaster Touchpad IT solutions Adobe Workers Software as a Service Legislation Language Accessory Virtual Assistant Samsung Hard Drive Display Gifts Computing Memory iOS WIndows Server 2008 Administrator Windows Ink Testing Humor Peripheral Windows 10s HBO Streaming Media Licensing Updates Bandwidth Lithium-ion battery Legal Comparison Computer Forensics Screen Mirroring Outlook Alexa for Business Computer Care Nanotechnology Antivirus Microsoft Excel IT budget Chromebook Co-Managed Services Credit Cards App store Financial Access Google Maps Spyware Camera Unified Threat Management Management Access Control Solid State Drive Chromecast Reputation Microsoft Word Meetings Specifications Virus Emails Cast History Root Cause Analysis Telephony Data storage File Sharing Printing Telephone Emergency Computer Fan Internet Exlporer Remote Computing Health Apple Projects Upgrades PowerPoint Admin Hard Disk Drive IT Management Point of Sale Tablets Maintenance Vendor Sales Proactive Marketing BYOD Wireless Sync Uninterrupted Power Supply Settings Storage Social Engineering Hyperlink Mobility FAQ Hybrid Cloud Search Identity Theft Edge Identity Websites Wireless Internet IT Solutions Transportation NFL eWaste Employee-Employer Relationship Laptop Retail Managing Stress Regulation Advertising USB Worker Training Monitors How To Books Education Hiring/Firing Television CrashOverride Video Games Experience Twitter HaaS Virtual Reality Company Culture End of Support Work/Life Balance Current Events Electronic Medical Records Relocation Crowdsourcing Employer Employee Relationship Benefits Phone System Personal Information Save Time Thank You Computer Accessories Battery Smart Technology PDF Flexibility Music Mobile Computing Instant Messaging Hacker es Congratulations Text Messaging Scalability Analytics Keyboard Compliance Entertainment Black Market Cleaning Printers Automobile Office Cache Office tips Big Data