Practical Online Security

Internet security practices have changed a lot in the 25+ years I’ve been around these parts, but one thing will always hold true: People are lazy! Even if you’re not lazy, anyone can make a mistake, especially if they don’t think it is one. It’s not even about being lazy in most cases, it’s just human nature to balance convenience and efficiency for day-to-day tasks.

Now, these days we have most companies enforcing minimum security practices like requiring upper / lower case letters, a number, and maybe a symbol if you’re lucky, and many users are starting to take security more seriously. That’s great in theory, but trust me when I say, I’ve seen my fair share of “Password1!” out in the wild, and there are still reports of unencrypted user data being leaked to the public quite frequently. On top of that, let’s hope the company is the one to tell you about it and not the news outlets, but what can you even do about companies losing our data? You best option is to try and minimize the splash and limit any collateral damage by practicing good security habits.

Here are some quick links to the topics that we’ll dig into a below to help you make some decisions:

1. Security Self-Assessments (e.g. Are you a target?)

As much as nobody wants to be a nobody, you have to consider who you are. Are you a high value target? Are you just a normal person using the internet? I know this sounds harsh, and don’t get me wrong, everyone has something to gain, lose, and be exploited over, sometimes you can even just be a low-hanging fruit for some threat actor under the right circumstances. There is an epidemic of scam emails and calls that usually end up targeting the elderly or technically illiterate, but chances are that’s not who is reading this post. Some of those scams can be circumvented with methods from this post, but in general don’t click / download / open anything and don’t hand over your login details and you’ll be safe from them.

On the other hand, if you work for some Fortune 500, Government Agency, or have a high-profile job title, you may find yourself targeted more often and by more dangerous threat actors. Usually these companies will have tighter security practices and force them on the users, but as we established in the beginning, people are lazy and make mistakes. A very prominent example of this is with the recent breach at LastPass, a password management company that is all about account security.

In most cases, you just need to try and avoid getting caught in wide-cast nets from low-effort attacks, unless you are in a position where you might be a target, but it’s important to know where you stand and what precautions you need to be taking. That said, it never hurts to be more secure than you need to be, as long as it’s not excessively inconvenient to your everyday life and activities.

2. Password Security / Password Managers

Another case where users can end up being at fault, you really need to change your passwords regularly, that limits the liability of leaks like this where data is encrypted and may take time to crack (in the cases where it’s theoretically possible). I’m not perfect about this either, although I’m making the effort to correct this as much as possible, I have my fair share of old and reused passwords and I’m not good about changing them either. All things considered, I’m a fairly low value target, so I’m not worried about the accounts that are affected, but I’m chipping away at resetting passwords.

Let’s talk about your options for password managers.

  • LastPass – We’ve established I wouldn’t recommend LastPass anymore. I love their services and apps, they’re incredibly feature rich, but between the security concerns and cutting features and functionality from free accounts, you should look elsewhere.
  • BitWarden – My personal choice at the moment. I originally chose it because they have the option and I was going to self-host a server on my home network. At the end of the day I used their online services because it was more convenient, they tend to be more technically oriented for those who are knowledgeable or are “Power Users”, but overall I haven’t had any complaints so far.
  • 1Password – Another solid choice that’s an online service, I don’t have much input on their services as I have not used them, but they seem to have a good security track record and I would feel safe using them.
  • KeePass – Different from the other options on this list, this is a file-based and local option, but I would argue this may be too advanced for most people. It requires you to deal with files, syncing, backups, multiple third-party apps / programs to deal with different features, and a lot of manual configuration. It’s perfectly usable on a basic level, but if used incorrectly it has a much higher threshold for user error. I use it as a backup for my password vault and some other use cases I’ll get into later, but overall I would not recommend for most people.

3. Two-factor / Multi-factor Authentication Options

Here’s where it starts to get more complicated… password managers are pretty straightforward. Sign up, enter passwords, use a browser extension or app to log in. EVERYWHERE has passwords, that’s just how it works. The problem with Two-factor authentication (2fa) or multi-factor authentication (mfa) is the options aren’t always clear and not every company / website will have what you intend to use, if any at all! To be clear, mfa is the same authentication types as 2fa, just more of them, and is used instead of saying 3fa, 4fa, etc.

You have a few kinds of 2fa options:

  • SMS / Phone Verification
  • Email Verification
  • App based authentication (Authy, Duo, Google authenticator, Microsoft authenticator, Yubico authenticator)
  • Hardware security keys (Yubikey)

Email verification is better, as long as you’re being good about your password security, but if you are reusing passwords or your email is comprised then it won’t make a difference. If you’re using a services that only offers email or SMS, make sure your password security is good and go with email verification.

Some sites also support the Yubikey itself as a form of 2fa without the need of an app, just log in and you’ll be prompted to plug in the key and follow the instructions to authenticate. Some sites even support a passwordless login with the keys, but those are rare at this point in time. You can also use it to log into and lock down a computer so it can’t be used without it.

The last feature for the Yubikey I’ll put here is the option for a “static password” to be stored on the key. In addition to the one-time passwords used to authenticate into accounts that come standard with the key, the static password is configured in the Yubikey Manager program and you can enter or generate a password that will always trigger the same output. Using this, you can use it by itself for a specific account or combo it with other passwords for even more security! In this way, even if your password manager was compromised, they might only have part of the password if the Yubikey holds the other half.

There are other security keys that aren’t from Yubico, but information and coverage on these products hard to find. If you were going to go with a hardware security key, I’d recommend sticking with Yubico until this kind of platform is more mature.

A very important note: make sure to disable any 2fa options you don’t intend to use on an account, otherwise they can become a security risk. You could have 2fa apps and a Yubikey, but if email or SMS verification is enabled on your account, the authentication apps and Yubikeys can be bypassed in most cases.

4. Limiting Your Digital Footprint

In general, it’s good to limit the exposure of your personal information as much as possible. This is Internet Safety 101, but with the popularity of social media platforms, some people tend to forget, overlook, or just don’t know. It can compromise your security questions, make it easier to track you and find you online, and even help compromise passwords in some cases.

Unfortunately, with most services having online portals, logins, etc. there’s not much you can do to avoid it these days. One practice that I have is I don’t add my banking or financial passwords to my online password manager and wherever possible avoid using first and last names in the username where an email is not being used.

Having an email as your name in some form or another is more professional, but using it as a primary address is also a security risk in some ways, it definitely gets more eyes on it than something random or generic. I get 15-20 spam emails a day because of the firstname+lastname configuration of my primary email, and I find that my other emails don’t tend to have that problem quite as heavily.

5. Choices I’ve Made & What I’d Do Differently

When I started my setup, it was a lot different than it is now. It’s one of the reasons I used LastPass, have a couple of Yubikeys, and 25 year old habits that I’m still trying to break. Like I said at the beginning, people are lazy, and I’m no exception. Right now, this is my current setup:

  • 2 Yubikeys
  • Yubico Authenticator
  • BitWarden Password Manager (autofill off)
  • Apricorn Aegis 3Z Flash Drive as sort of a “cold storage” backup
  • Keepass to keep more sensitive passwords, backup codes, and as a Bitwarden vault backup

If I was starting over fresh, what would I do? I’d keep most of it the same, but probably skip the Yubikeys and go with something like Duo or Authy that has cloud backups for my authenticator. I don’t utilize a lot of the features on my Yubikey at this time, combined with the fact it’s so limited. I bought mine before the price increase, but I don’t think I’d want to drop the $100 on a pair if I didn’t already have them.

Security is inconvenient, but very necessary in our modern world. This is just an overview of a lot of products and practices, but if you’d like to discuss more about it or have me go in depth with some specific products, let me know!

I’ll be coming back and updating this as I have time and have more thoughts, but for now that’s my take on the matter

-Matt


Posted

in

,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *