|Innovating The Next Big Thing||March 4, 2015|
• Analyst Insights
• Enterprise Insights
• Network & Information Security
• Enterprise Mobility
• Remembering 9/11
Next Innovator Group
Feedjit Live Traffic Feed
• Ghost City
Barry's Book Shop
my1login Ends Security Nightmare of Multiple Passwords
Mar 1, 2012 – Ross Clarke
my1login is the first personal portal to offer bullet-proof password management integrated with a dashboard for email and social media.
A new secure personal portal, my1login, launches today in the US and UK giving web users a highly encrypted ‘vault’ where they can manage, store and even safely share their logins, passwords and PINs using a free, highly secure, web-based interface.
Mark Zuckerberg the CEO of Facebook had his fan page hacked in January 2011. If he isn’t safe on his own social networking site then who is? It’s not clear whether he was careless with his password, was phished or was sidejacked on an insecure wi-fi connection but the incident was designed to be more of a public embarrassment than a real security threat to him personally.
Another login scare came last April when some of Sony PlayStation’s 77 million account holders were hacked and passwords were compromised. This really became a problem where people had used the same login details for Sony as they had for their email account, essentially giving hackers the keys to their online castle.
The scary thing is however that when most ordinary people have security breaches of their social networking, thieves are operating in stealth mode trying to gain more sensitive data they can use for identity theft or credit/debit fraud. What’s more, once they are in, they often return again and again sharing their hack with other criminals and you may never know until it’s too late.
One problem is that most people now have as many as 50 different online logins and passwords to remember and there is a tendency for them to do one of two things, both of which help the criminal. Either they use the same or similar passwords for everything – which is most convenient for the thief and is enormously insecure, or they resort to writing down passwords in a file, an equally dangerous practice. The growth of identity theft and fraud means that 1 in 20 of us in the coming year will experience some kind of cyber attack or attempted fraud.
So using stronger encryption technology than most online banking platforms, my1login (www.my1login.com) completely eliminates the need to memorise multiple usernames and passwords at the same time helping users increase their online security.
Mike Newman, managing director of my1login, describes it as a ‘safety deposit box within a vault’.“We all have more passwords and PIN numbers than we can easily remember and my1login stores them all in one place, helping you login faster and more securely than ever before,” said Newman.
Social networking feeds and e-mail all in one place
My1login uses military grade encryption and has undergone a security audit by the Hewlett Packard Group. In addition, Verisign provides their encryption certification. Access to stored and encrypted passwords comes through each user’s chosen unique ‘key’, which remains fully private and not accessible by my1login staff. It uses internationally endorsed encryption standards with the user’s browser encrypting all login data using the chosen ‘key’, before transmitting it for secure storage on my1login’s database. The encryption key is a memorable phrase created by the user. and a key consisting of even as few as 20 characters would take today’s most advanced supercomputers, millions of years to decipher every possible combination.
Newman explains: “Think of my1login as just like a safety deposit box stored in a bank vault. Like the bank, we provide you with a secure vault which contains your locked safety deposit box. We can give you access to the vault, but unless you have your key then neither we nor you can unlock the box and access what’s inside. Your privacy and security is therefore fully protected.”
Fifty logins become one
The service is free to use for individuals, with ‘pro’ and soon to launch, ‘premium’ versions available by subscription, and is designed to be their single, secure point of entry to every site that they log into on the web, wherever they are and from whichever device they are using. Users can also store all their bookmarks online – to access from any computer or mobile device.
Aside from its password management function, the my1login web-based interface also features an integrated personal online dashboard, where users can manage all their Facebook, Twitter and LinkedIn updates and review e-mails in one place and in real time, without having to log in to each separate application.
my1login stores all users’ information in datacentres that operate within an ISO 27001 accredited secure environment. Being cloud-based means users can securely access their logins from any computer or mobile device with a web connection. It is easy for users to set up their accounts, there are no downloads and there is no need to install any software.
my1login completely eliminates the need for users to remember multiple logins, allowing them to use extremely complex randomly generated passwords, further enhancing their security.
Newman continues: “The current trend is towards internet users having more and more logins and having to access them from multiple locations and devices. It is simply too time consuming and insecure, to login to each application or web destination manually. Using my1login helps build a secure fortress around your online identity, making it simple to log in to websites whilst our social networking and e-mail feeds make us absolutely unique in the market.”
» Send this article to a friend...
» Comments? Tell us what you think...
» More Enterprise Insights articles...
Commentsblog comments powered by Disqus
Support This Site
• 2/12 Faultline: Streaming services “chip away” at Broadcast TV
• 2/12 Faultline: WiFi Alliance voices “concerns” over growing LAA services
• 2/12 Faultline: “Survey shows linear TV’s hold is slipping as viewing habits shift
• 2/12 Faultline: Charter Q4 results show footprint growth but not profit
• 2/12 Faultline: “Internet services will face increasing content costs”
• 2/11 Canalys News: Over 720,000 Android Wear devices shipped in 2014
• 2/5 Faultline: Two newest Telefonica UK MVNO partners show positive results
• 2/5 Faultline: SeaChange jettisons staff to stay afloat
• 2/3 Canalys News: Media alert: Micromax reaches number one in smart phones in India for the first timef
• 2/2 Canalys News: Worldwide tablet shipments fall for the first time – down by 12% in Q4 2014
• 1/30 HP Security Products Blog: “I’m just here so I don’t get fined”Enterprise security: What’s new for the week of January 26, 2015
• 1/30 HP Security Products Blog: “I’m just here so I don’t get fined”
• 1/30 McAfee Blog Central: Hackers Access Taylor Swift’s Social Accounts. Her Advice: Shake It Off
• 1/30 McAfee Blog Central: New Year, New Opportunities; Special Guest Scott Lovett
• 1/30 IBM News: IBM Research To Lead Company's Advanced Computer Chip R&D At SUNY Polytechnic Institute
• 1/30 IBM News: IBM Announces Services Center in UK, Creating up to 300 New Tech Roles
• 1/30 IBM News: IBM serves real time interactive data to fans at the Australian Open
• 1/29 HP Security Products Blog: The effect of management turnover in your SOC
• 1/29 HP Security Products Blog: HP TippingPoint DVLabs threat assessment--Ghost
• 1/29 Ovum: Apple Watch could bring an extra US$16.5bn to Apple’s revenues by 2020
• 1/29 Wireless Watch: Apple posts record numbers, but it all hinges on the iPhone
• 1/29 Wireless Watch: As Samsung’s low end dash crushes profits, Huawei turns premium
• 1/29 Wireless Watch: Sky defects from Vodafone to O2 to join UK quad play race
• 1/29 Wireless Watch: India lowers spectrum prices, but not as far as GSMA wants
• 1/29 Faultline: UK communications numbers mostly heading in the right direction
• 1/29 Faultline: Broadband Delivered sports to increase 10-fold by 2025
• 1/29 Faultline: Apple posts record numbers, success hinges entirely on iPhones
• 1/29 Faultline: Sky throws in its quad play hand with Telefonica
• 1/29 Faultline: Vultures circle as India enters final cable digitization phase
• 1/29 Faultline: Imagine buys RGB Networks for multiscreen delivery portfolio
• 1/29 RSA Security News: EMC Reports Full-Year 2014 Financial Results, Record Fourth-Quarter Revenue
• 1/29 McAfee Blog Central: What We Need to Fight Back (Blog 1 of 4)
• 1/29 McAfee Blog Central: Super Scammers Flock to Super Bowl. Here’s How to Avoid Them
• 1/29 McAfee Blog Central: To Make Security Work for Work, Companies Need to Invest in Automatic Solutions
• 1/29 Intel News: 5th Generation Intel® Core™ vPro™ Processors Aim to Transform Today's Workplace
• 1/29 IBM News: IBM Research and Mars, Incorporated Launch Pioneering Effort to Drive Advances in Global Food Safety
• 1/29 Cyber Trust Blog: The Importance of Effective Information Sharing
• 1/28 Gartner Says By 2017, U.S. Customers' Mobile Engagement Behavior Will Drive Mobile Commerce Revenue to 50 percent of U.S. Digital Commerce Revenue
• 1/28 iSuppli: Apple's record iPhone results prove no mobile market leader's position is ever secure
• 1/28 Symantec News: Symantec Selects Veritas Technologies Corporation as the Name for its Independent Information Management Company
• 1/28 McAfee Blog Central: 2015 – Intel Releases New Discovery Education Module on Cybersecurity
• 1/28 McAfee Blog Central: 2015 – Time to Reexamine Cyber Parenting and Cyber Safety
• 1/28 IBM News: IBM Research Announces Cloud Breakthrough For Protecting Personal Data
• 1/28 Cyber Trust Blog: Data Privacy Day in a World of Cloud Computing
• 1/27 Gartner Says Power Shift in Business Intelligence and Analytics Will Fuel Disruption
• 1/27 Canalys News: Media alert: Apple takes top spot in China for first time in smart phones
• 1/27 McAfee Blog Central: Mobile Ad Networks Puncture Your Personal Defenses
• 1/27 McAfee Blog Central: Security Skills Shortage? Don’t Panic!
• 1/27 IBM News: EMLYON Business School to Create a 'Smart Business School' via IBM Cloud
• 1/27 Cyber Trust Blog: Six Proposed Norms to Reduce Conflict in Cyberspace