• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Password Managers: The Unsung Heroes of Cyber-Security

You are here: Home / Security News / Password Managers: The Unsung Heroes of Cyber-Security
https://core0.staticworld.net/images/article/2014/07/password-100364419-large.jpg
https://core0.staticworld.net/images/article/2014/07/password-100364419-large.jpg

One of the most commonly used and well recognised security mechanisms the world over is the ‘Password’. In spite of the overwhelming use of passwords on the frontline help secure systems and devices around the globe, passwords are still, in significant numbers, being created, stored and managed poorly.

This is evidenced by what seems to be a near constant stream of reports of compromised and stolen passwords. The latest incident report to make mainstream headlines and begin trending on social media is the release of a massive number of account details (over 68 Million according to some sources, or approximately 2/3rd of the customer base at the time) for the popular cloud storage site Dropbox. This incident is a perfect example and timely reminder for all those with password protected accounts (i.e. Everyone).

Despite the initial data-breach occurring in 2012 it is only within the last few weeks that the account details that were obtained by the unknown malicious party were leaked. The compromised account details included passwords linked to email addresses, stored using a pair of encryption methods (Dropbox had updated some of its encryption used around the time of the breach but it appears it was not applied on accounts created prior to the update), one of which is woefully inadequate in today’s security environment.

The SHA-1 encryption (the weaker of the two used on passwords obtained during the breach) is on the chopping block at the end of this year, having been disparaged by vendors including Google and Microsoft due to identified “Significant Mathematical Weaknesses” that would enable it to be compromised without excessive effort. It is subsequently being replaced by SHA-2 and other superior encryption methods, although this will be of little comfort to those with passwords that were ‘protected’ and stolen while using SHA-1.

It is estimated that around 36 million of the accounts compromised had their passwords stored under SHA-1 encryption. As such Dropbox has been urging users to reset their passwords to prevent them being used for unauthorised access to Dropbox accounts. This however does not help those users who may have, despite the urgings of countless security bulletins, used the same password (or slight variations on the same password) across a variety of accounts.

This however does not help those users who may have, despite the urgings of countless security bulletins, used the same password (or slight variations on the same password) across a variety of accounts.

When the data breach occurred in 2012 it was reported that only user names and emails were compromised, not passwords. The omission of this information in the breach report may have caused users to defer changing their password at the time. As such, various repositories of information were put at risk if the same password was being used across multiple accounts.
The key lesson here is that security breach reporting from online suppliers may be ineffective, either through deliberate concealment to avoid reputational damage, or through poor practices; it may also be or completely non-existent in the worst case. As such users should be seeking to be proactive in protecting their personal account details, regardless of the information communicated by affected entities.

users should be seeking to be proactive in protecting their personal account details, regardless of the information communicated by affected entities.

The use of varied complex passwords across accounts will help significantly in limiting the impact of breaches like the one identified in this article, especially as it is highly likely that the average internet user will have their details compromised at some point in the future (if they haven’t been compromised already).
Password management tools have emerged as one of the best ways to help secure accounts by using complex and random near un-guessable passwords. They also help to eliminate the need to remember each individual password for every user account, and only the master password to access the manager itself is required to be committed to memory.

Password management tools have emerged as one of the best ways to help secure accounts by using complex and random near un-guessable passwords.

The use of a such a tool can help provide a solid frontline of defence for your accounts, and a brief Google search will net a variety of free and pay-for-use password managers. The cost of losing several important accounts due to weak and shared passwords can far outweigh the cost (in time and effort more often than not) of implementing such a tool.

The cost of losing several important accounts due to weak and shared passwords can far outweigh the cost (in time and effort more often than not) of implementing such a tool.

Interested in seeing if your email address(es) have been listed as part of a major breach? Click here to check.

The Agilient Team

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane