Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Considering LastPass’ Breach, Should Password Managers Be Trusted?

Considering LastPass’ Breach, Should Password Managers Be Trusted?

It’s been about a month since LastPass—one of the most well-known and popular password managers out there—suffered a security breach where attackers managed to worm their way into the systems where LastPass stored its source code. Let’s review the situation, and what your response should be.

First, let’s go over what we know.

LastPass Lost Their Intellectual Property, Not Customer or Employee Data

According to the password manager’s report, no customer or employee data was successfully accessed, with those responsible instead only gaining access to the password manager’s proprietary source code. We say “only” because many pieces of proprietary software these days use many, many open source components, all of which need to be documented even if some modifications were made.

So, while LastPass’ source code could be helpful to a prospective attacker, it isn’t going to be their magic bullet to get in.

This is also why open-source projects—where source code is openly shared so it can be examined and improved upon—are able to exist. Many of these open source projects have received security updates for vulnerabilities that went unnoticed, despite all eyes having access to the code.

Furthermore, a Decent Password Manager is Effectively Useless to Break Into

To explain this, let’s pretend that your password manager is like a giant bank. You go to the bank and deposit your money—your passwords and other credentials—into their vault for safekeeping.

The fear is that, should someone manage to break into the bank and access the vault, all of your money is there for the taking. This would be the case if your password manager was just storing the passwords you provided on their own servers. However, that isn’t how a reputable password manager functions.

To return to our bank analogy, the vault is really only filled with safety deposit boxes that are brought to you when you need to access them. You have your master key (the password to the vault) along with another, secondary form of identity authentication to provide that is generated on the spot, and required to access your safety deposit box.

Notice that the bank doesn’t have the key to your vault, meaning that they actually can’t allow someone else to access your safety deposit box, whether that someone is a criminal or a member of law enforcement.

This is how a password manager works: rather than storing your passwords, encrypted versions of your passwords are stored—and, with you being the only one with the password to your other passwords, the password manager can’t decrypt them on its own.

So Yes, It is Still a Good Idea to Use a Password Manager…

…and for a few reasons, too.

  • A decent password manager helps reinforce password best practices, in that it condenses the tens and dozens of passwords you should be remembering into a single password that is supported by multi-factor authentication. It’s no secret that many people shrug off the best practice of using a unique password for each account. Because the password manager stores them for you, you only need to remember the one password that gives you access to your password storage.

  • A decent password manager can help you come up with better passwords, preventing you from using recognizable patterns. I want you to do me a favor and think of a completely random password. Now, consider that password and see if you included any personal details or other information that could be associated with you. Did you stick to a pattern that you’ve used in your other passwords? A password manager can help you avoid these habits by generating longer, more complex passwords on your behalf.

  • A decent password manager will stop you from recycling passwords. Let’s say that a website you have an account on is hacked, and your login credentials are exposed in the data breach. If you’ve used the same login credentials elsewhere, that’s another however-many accounts that have been compromised. A password manager removes the temptation to use the same password everywhere, because it makes it easier for you to switch them up.

  • A decent password manager will help protect you from phishing sites. You and your password manager see websites differently, so while you may see Facebook or a Gmail login page, your password manager won’t, and will prompt you to not put in your credentials.

Make No Mistake, the LastPass Hack Isn’t Good News…

…but it also isn’t nearly as bad as it could have been. Voyage Technology is here to help you make sure that your security is as established as possible, protecting you from issues, threats, and attacks—including through the use of a reliable password manager. Give us a call at 800.618.9844 to find out what we offer to businesses.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Data Recovery AI Upgrade Disaster Recovery VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Information Facebook Miscellaneous Gadgets Training Covid-19 Cloud Computing Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Blockchain Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi BYOD Computing Information Technology Access Control Conferencing Hacker Office 365 Avoiding Downtime Marketing How To BDR HIPAA Applications 2FA Virtual Private Network Help Desk Risk Management Health Computers Analytics Office Tips Healthcare Augmented Reality Website Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data Operating System Windows 11 Physical Security Monitoring Display Printer Excel Paperless Office Customer Service Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Project Management Scam Windows 7 Data loss Firewall Microsoft 365 Solutions Going Green Patch Management The Internet of Things Save Money Remote Monitoring Vulnerability End of Support Social Vendor Management Cybercrime VPN YouTube Meetings Holidays Data Storage Cryptocurrency Customer Relationship Management Smart Technology Supply Chain Video Conferencing Computer Repair Managed Services Provider Saving Time Virtual Desktop Virtual Machines Professional Services Hacking Data storage LiFi Presentation Managed IT Service Outlook Machine Learning Wireless Technology Downloads Money iPhone Licensing Humor Entertainment Vulnerabilities Data Privacy Maintenance Antivirus Sports Word Mouse Images 101 Telephone System Multi-Factor Authentication Mobility Administration Cost Management Safety Employees Robot Integration Settings Printing User Tip Modem Wireless Processor Content Filtering Mobile Security IT Management Proxy Server Reviews Cookies IBM Network Congestion Cyber Monday Medical IT Hotspot Transportation Small Businesses Google Drive User Error Tactics Development Knowledge Mirgation Hypervisor Displays Shopping Point of Sale Nanotechnology Optimization 5G PowerPoint Language Employer/Employee Relationships Outsourcing Google Docs Unified Communications Addiction Experience Management PCI DSS Running Cable Tech Support Chatbots Competition Navigation Bitcoin Network Management Google Wallet Gig Economy Screen Reader Monitors Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Regulations Compliance Laptop Websites Identity Evernote Paperless Windows 8 Drones Bookmark Smart Tech Memes Co-managed IT User Alerts SQL Server Technology Care SharePoint Download Net Neutrality Electronic Medical Records Financial Data Halloween History Business Communications Lenovo Browsers Smartwatch Connectivity IT IP Address Writing Break Fix Scams Azure Hybrid Work Upload Procurement Virtual Reality Hacks Server Management Social Network Telework Scary Stories Private Cloud Cyber security Multi-Factor Security Tech Human Resources Superfish CES Identity Theft IoT Communitications Fun Dark Web Cables Recovery Twitter Hard Drives Deep Learning Trends Supply Chain Management Customer Resource management FinTech Error Regulations Domains Google Calendar Term Google Apps Data Analysis Education Star Wars IT Assessment Social Engineering Microsoft Excel IT Maintenance Remote Computing Staff Value Business Intelligence Refrigeration Gamification Flexibility Mobile Computing Organization Social Networking Public Speaking Legislation Shortcuts Fileless Malware Digital Security Cameras Tablet Smart Devices Lithium-ion battery Search Ransmoware Alert Wearable Technology Memory Vendors Entrepreneur Best Practice Content Remote Working Managed IT Health IT Buisness File Sharing Motherboard Data Breach Dark Data Comparison Google Play Be Proactive Legal Directions Videos IT solutions Assessment Electronic Health Records How To Permissions Workforce Notifications Wasting Time Threats Undo Business Growth Travel Trend Micro Specifications Security Cameras Workplace Strategies Techology Microchip Google Maps Internet Exlporer Software as a Service Cortana Fraud Meta Managing Costs Amazon Alt Codes Username Downtime Unified Threat Management eCommerce Black Friday SSID Application Unified Threat Management Hosted Solution Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Typing

Blog Archive