Building a business case for password managers
Davey Winder ponders the best way for SMBs (and larger firms) to tackle the thorny issue of password security


Passwords have always been at the heart of data security policies, and often data security breach reporting as well. Be it the password re-use question, the too simple to crack versus too complex to remember debate, or, as I touched upon recently, whether passwords are old tech that should be sent to the security scrap heap.
The unravelling Heartbleed saga has brought the password problem to the fore once more for both enterprise users and consumers.
Wearing my small business security consultant hat, one of the arguments I often find myself on the receiving end of is that I shouldn't be recommending the use of password managers as a solution.
"They are OK for the consumer who has no business critical data to protect, but even then the adoption case is a marginal one in terms of the security they offer," I am repeatedly told by people who usually fall into one of two categories.
The first are security consultants who deal exclusively with the medium-to-large' bit of the SMB sector. No consultant in their right mind would recommend consumer-grade password manager software to this level of enterprise application. Just because they are not an acceptable fit with the bigger players, does not mean that the smallest enterprises cannot benefit from using them nor that they are inherently insecure.
This brings me to the second category: the password naysayers who want to sell you on some other method of authentication and access control. This second group will often use the 'all your eggs belong to us' argument. In that, putting all your passwords in one place creates a very attractive target for hackers.
I agree. If there was a compromise, it would be disastrous. Just like it would be if that small business was re-using passwords across services and one of them suffered a breach. Just like if the passwords being used were not strong enough to resist attempts to crack them. Just like so many data breach scenarios involve passwords.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Would I rather see every enterprise adopt tokenisation, multi-factor authentication method? Of course I would, but that ain't going to happen at the bottom of the enterprise sizing graph where money, time and technical knowledge are all too often in short supply.
Davey is a three-decade veteran technology journalist specialising in cybersecurity and privacy matters and has been a Contributing Editor at PC Pro magazine since the first issue was published in 1994. He's also a Senior Contributor at Forbes, and co-founder of the Forbes Straight Talking Cyber video project that won the ‘Most Educational Content’ category at the 2021 European Cybersecurity Blogger Awards.
Davey has also picked up many other awards over the years, including the Security Serious ‘Cyber Writer of the Year’ title in 2020. As well as being the only three-time winner of the BT Security Journalist of the Year award (2006, 2008, 2010) Davey was also named BT Technology Journalist of the Year in 1996 for a forward-looking feature in PC Pro Magazine called ‘Threats to the Internet.’ In 2011 he was honoured with the Enigma Award for a lifetime contribution to IT security journalism which, thankfully, didn’t end his ongoing contributions - or his life for that matter.
You can follow Davey on Twitter @happygeek, or email him at davey@happygeek.com.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Report: UK’s SME tax-relief schemes exacerbating Golden Triangle growth disparity
News A report from the UK Treasury has called for more targeted support for tech SMEs
By Ross Kelly Published
-
An end-to-end roadmap for SMB cloud migration
Whitepaper Future-proofing transformation
By ITPro Published
-
The total economic impact™ of Datto
Whitepaper Cost savings and business benefits of using Datto Integrated Solutions
By ITPro Published
-
The most significant challenges facing SMBs post-pandemic
In-depth We examine the obstacles small and medium businesses face in a post-pandemic world
By Sarah Thomson Published
-
Help to Grow: Government responds to SMB SOS
Whitepapers Sample our exclusive Business Briefing content
By ITPro Published
-
NetSupport DNA 4.5 review
Reviews A prize asset management solution packed with valuable features and priced right for SMBs
By Dave Mitchell Published
-
SMEs to increase digital spending in next six months
News A study has revealed 69 per cent of SMEs want to buy new tech and premises to boost productivity
By Clare Hopping Published
-
Dell PowerEdge R920 review
Reviews Powered by Intel’s latest E7 v2 Xeon processors, the PowerEdge R920 also beats HP alternatives when it comes to storage features
By Dave Mitchell Published