For many years, the security industry has advised computer users to choose long and complex passwords to protect their data and accounts, because it’s their very length and complexity that determines how onerous a task it is to crack them. At the end of the day, passwords are the key to the fortress, and even walls of steel that are meters thick are useless if the front door lock can be picked in a few minutes.
However, recent breaches, such as the Ashley Madison breach where the identities of 37 million potentially cheating spouses were exposed, begs the question of whether we are focussing too much on long and complex passwords, as they can be compromised should the Web site have inadequate security measures in place.
Simon Campbell-Young, CEO of Phoenix Distribution, says strong passwords are not linked to any details about the holder, such as children’s names or birthdays. They cannot be guessed by knowing a little bit about the holder, and are resistant to brute force hacking. They are also not the more obvious ‘password’ or ‘123456’ types of choices that a surprising amount of people still use.
However, he says that many Web sites with very specific password mandates, indicating that a password is weak, medium or strong, don’t really analyse the strength per se, they only look at whether or not there is enough differentiation in terms of a mixture of upper and lower case, numbers and special characters, as the more differentiation there is, the more brute-force combinations will need to be used by hackers.
A strong password will certainly be more difficult to crack on Web sites that have basic password obfuscation methods in place, but a strongly protected weak password, is most likely as good as a badly protected strong one.
“Today, most of us are overwhelmed by the sheer number of passwords and logins we need to remember. Every financial account, online shopping account, social media site, loyalty programme – the list is endless. It is no wonder that many people use the same password for each and every one, and keep their fingers crossed that each site and service has measure in place to prevent the interception of your password.”
He says that for anyone who uses the same password everywhere, any single breach in which it’s exposed that an organisation didn’t protect password entry or storage, will be exposed at every other site. When your password leaks, cyber criminals now have an email address, username, and password combination they can try on other Web sites. “The solution here, is to create strong, unique passwords by using a password manager, that don’t require memorise a plethora of individual passwords.”
According to Campbell-Young, password managers store your login information for all the Web sites you use and help you log into them automatically, encrypting your password database with a master password, the only one you’ll be required to remember.
A password manager offers ease of mind, he says. “When you use a password manager and need to log into a Web site, you’ll visit the Web site, but instead of typing your password into the site’s login space, you type your master password into the password manager, which will automatically fill the appropriate login information into the Web site. No longer must you think about which email and password you chose for this particular site, the password manager does all the work for you. Similarly, when you are creating a new account, the password manager will issue a popup and offer to generate a secure, unique password for you.”
Behind the Scenes
Phoenix Distribution is currently the leading Value Added distributor of software, accessories and peripherals across the African continent, covering software publishing, localisation and product distribution across multiple territories in multiple languages.
The business is segmented into two divisions, namely corporate software licensing and retail product distribution, and Phoenix Distribution dominates the consumer and SMB security sectors through key brands which include: Norton/Symantec, AVG, Kaspersky and Bitdefender. Additional brands within the consumer-focused range include, Microsoft software and peripherals, Beats by Dr Dre, Trendnet Wireless products, Monster Cables and mobile accessories.
The corporate licensing division sells volume licensing into the enterprise and SMB reseller environments, as well as covering architecture and implementation. The ESD division delivers download content into all channels, including B2B and B2C.
The retail division delivers physical product into the retail environment, covering all mainstream ICT, CES, telco, lifestyle, fashion and sports outlets, as well as independents and online stores. This division delivers direct to outlets and or customers across sub-Saharan Africa.
Phoenix Distribution is growing at 70% per annum, with additional acceleration coming from development within the greater African marketplace, as well as the acquisition of significant high-end product lines within the enterprise arena. In addition, the company’s UK business, PX Security, is firmly entrenched within the UK retail and SMB reseller environments, shipping product through trusted distribution partners into mainstream retail outlets and direct engagement with B2B resellers. The UK operation publishes and distributes Bitdefender, Webroot and Avast.
Additional bespoke services offered to partners include Electronic Software Distribution within the B2B and B2C environments, category management, training and end-to-end merchandising.
Phoenix Distribution, including the UK subsidiary PX Security, was recently acquired by First Technology Holdings.
- Taming the ‘black swan’ gives rise to the Gig economy | #Opinion | #Mamiki Matlawa | Qunu Staffing | #ebizradio - January 17, 2022
- In the news this week | #News | Kuhle Tshabalala | #Podcast | #ebizradio - January 14, 2022
- BE BOLD, BE BRAVE | #UnscriptedLife | Clive Vanderwagen | Craig Urbani |#Podcast | #ebizradio - January 14, 2022
- Are you thinking of buying a pre-owned 4×4? | #Motoring | Diesel and Dust | Tumelo Maketekete | #Podcast | #ebizradio - January 13, 2022
- How Paying it Forward in business changes the environment | #LTC | Lunchtime Series | Kevin Britz | Helen Martin | #Podcast | #ebizradio - January 12, 2022
- How professionals create good money habits | Change Conversations | Mpume Ncube Daka | Amanda Dambuza | #ebizradio | #Podcast - January 11, 2022
- The 2022 School Year: What Teachers, Parents and Learners Can Expect | #Classroom | #ebizradio | The Love Trust - January 10, 2022
- An African Platform for African business by African Business | #Entrepreneur | Word of Mouth | Lindi Tshabangu | Grace Mumo | Luxury Xclusives - January 10, 2022
- No matter what – SHOW UP! | #Entrepreneur | #BizInsight| Ingrid von Stein | Daniel Kahn | Firstwatch | #Podcast | #ebizradio - December 22, 2021
- Mission Possible! – A global health doctor takes on a new mission | #Insight | Ingrid von Stein | Dr. Allan Pambe | Roche Diagnostics | #Podcast | #ebizradio - December 22, 2021