Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Considering LastPass’ Breach, Should Password Managers Be Trusted?

Considering LastPass’ Breach, Should Password Managers Be Trusted?

It’s been about a month since LastPass—one of the most well-known and popular password managers out there—suffered a security breach where attackers managed to worm their way into the systems where LastPass stored its source code. Let’s review the situation, and what your response should be.

First, let’s go over what we know.

LastPass Lost Their Intellectual Property, Not Customer or Employee Data

According to the password manager’s report, no customer or employee data was successfully accessed, with those responsible instead only gaining access to the password manager’s proprietary source code. We say “only” because many pieces of proprietary software these days use many, many open source components, all of which need to be documented even if some modifications were made.

So, while LastPass’ source code could be helpful to a prospective attacker, it isn’t going to be their magic bullet to get in.

This is also why open-source projects—where source code is openly shared so it can be examined and improved upon—are able to exist. Many of these open source projects have received security updates for vulnerabilities that went unnoticed, despite all eyes having access to the code.

Furthermore, a Decent Password Manager is Effectively Useless to Break Into

To explain this, let’s pretend that your password manager is like a giant bank. You go to the bank and deposit your money—your passwords and other credentials—into their vault for safekeeping.

The fear is that, should someone manage to break into the bank and access the vault, all of your money is there for the taking. This would be the case if your password manager was just storing the passwords you provided on their own servers. However, that isn’t how a reputable password manager functions.

To return to our bank analogy, the vault is really only filled with safety deposit boxes that are brought to you when you need to access them. You have your master key (the password to the vault) along with another, secondary form of identity authentication to provide that is generated on the spot, and required to access your safety deposit box.

Notice that the bank doesn’t have the key to your vault, meaning that they actually can’t allow someone else to access your safety deposit box, whether that someone is a criminal or a member of law enforcement.

This is how a password manager works: rather than storing your passwords, encrypted versions of your passwords are stored—and, with you being the only one with the password to your other passwords, the password manager can’t decrypt them on its own.

So Yes, It is Still a Good Idea to Use a Password Manager…

…and for a few reasons, too.

  • A decent password manager helps reinforce password best practices, in that it condenses the tens and dozens of passwords you should be remembering into a single password that is supported by multi-factor authentication. It’s no secret that many people shrug off the best practice of using a unique password for each account. Because the password manager stores them for you, you only need to remember the one password that gives you access to your password storage.

  • A decent password manager can help you come up with better passwords, preventing you from using recognizable patterns. I want you to do me a favor and think of a completely random password. Now, consider that password and see if you included any personal details or other information that could be associated with you. Did you stick to a pattern that you’ve used in your other passwords? A password manager can help you avoid these habits by generating longer, more complex passwords on your behalf.

  • A decent password manager will stop you from recycling passwords. Let’s say that a website you have an account on is hacked, and your login credentials are exposed in the data breach. If you’ve used the same login credentials elsewhere, that’s another however-many accounts that have been compromised. A password manager removes the temptation to use the same password everywhere, because it makes it easier for you to switch them up.

  • A decent password manager will help protect you from phishing sites. You and your password manager see websites differently, so while you may see Facebook or a Gmail login page, your password manager won’t, and will prompt you to not put in your credentials.

Make No Mistake, the LastPass Hack Isn’t Good News…

…but it also isn’t nearly as bad as it could have been. Voyage Technology is here to help you make sure that your security is as established as possible, protecting you from issues, threats, and attacks—including through the use of a reliable password manager. Give us a call at 800.618.9844 to find out what we offer to businesses.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Google Privacy Email Workplace Tips Computer Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Saving Money Passwords Quick Tips Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Automation Artificial Intelligence Facebook Holiday Gadgets Covid-19 Cloud Computing Compliance Training IT Support Remote Work Outsourced IT Server Managed Service Provider Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Vendor Bandwidth Windows 10 Wi-Fi Virtualization Blockchain Apps Mobile Office Data Security Managed Services Two-factor Authentication Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Mobile Device Management Voice over Internet Protocol Gmail BYOD WiFi Office 365 HIPAA Applications Hacker Password Avoiding Downtime Managed IT Services How To Marketing BDR Conferencing Computing Physical Security Information Technology Access Control Office Tips Analytics Router Augmented Reality Retail Computers Storage Bring Your Own Device 2FA Help Desk Website Healthcare Operating System Virtual Private Network Risk Management Big Data Health Solutions Document Management Customer Service Scam Windows 11 Data loss Monitoring Excel Going Green Patch Management Managed IT Service Save Money Remote Workers Remote Monitoring Firewall Telephone Vulnerability End of Support Vendor Management Cybercrime The Internet of Things Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Social Microsoft 365 Infrastructure Outlook Customer Relationship Management Machine Learning Employees Money Integration Humor User Tip Hacking Modem Maintenance Mobile Security Processor Presentation Antivirus Sports Mouse Holidays Wireless Technology Data Storage Administration Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Word Robot Settings Printing Downloads Wireless iPhone Content Filtering IT Management Licensing Safety VPN YouTube Meetings Vulnerabilities Entertainment Cryptocurrency Data Privacy Computer Repair Images 101 Telephone System Multi-Factor Authentication Virtual Desktop Mobility Data storage Cost Management LiFi IBM Content Remote Working Windows 8 Wearable Technology Memory Vendors Laptop Websites Health IT Drones Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Electronic Medical Records Directions Videos SharePoint Assessment Electronic Health Records Wasting Time Threats Halloween Lenovo Trend Micro Specifications Security Cameras Workplace Strategies Writing Fraud Meta Virtual Reality Microchip Competition Internet Exlporer Software as a Service Username Hacks Server Management Managing Costs Amazon Scary Stories Private Cloud Superfish eCommerce Identity Theft Black Friday SSID Fun Deep Learning Virtual Assistant Outsource IT Twitter Database Surveillance User IT Technicians Virtual Machine Environment Error Media Social Engineering Proxy Server Reviews Cookies Education Cyber Monday Medical IT Hotspot Transportation Small Businesses Remote Computing Tactics Development IP Address Mobile Computing Mirgation Hypervisor Displays Search Shopping Nanotechnology Optimization Tablet PowerPoint Best Practice Language Employer/Employee Relationships Outsourcing Alert Addiction Management PCI DSS Managed IT Recovery Chatbots Buisness File Sharing Navigation Dark Data How To Gig Economy Legal Hard Drives Screen Reader IT solutions Distributed Denial of Service Workplace Domains Service Level Agreement Internet Service Provider Business Growth Computing Infrastructure Teamwork Hiring/Firing Notifications Regulations Compliance Identity Travel Evernote Paperless Co-managed IT Cortana Bookmark Techology Refrigeration Smart Tech Memes Google Maps Public Speaking Download Net Neutrality Alt Codes Alerts SQL Server Technology Care Lithium-ion battery Financial Data History Downtime Unified Threat Management Business Communications Entrepreneur Break Fix Scams Browsers Smartwatch Unified Threat Management Connectivity IT Hosted Solution Upload Procurement Typing Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Network Congestion Dark Web Cables Knowledge CES Google Drive User Error Undo IoT Communitications Trends Supply Chain Management Customer Resource management FinTech Regulations Point of Sale Google Calendar Term Google Apps 5G Microsoft Excel IT Maintenance Experience Data Analysis Google Docs Star Wars IT Assessment Unified Communications Gamification Flexibility Bitcoin Network Management Staff Value Business Intelligence Running Cable Tech Support Organization Google Wallet Application Social Networking Legislation Shortcuts Monitors Ransmoware Fileless Malware Digital Security Cameras Smart Devices

Blog Archive