Passportal CEO Colin Knox's Perspectives
We reached out to Passportal CEO Colin Knox for some perspective. Passportal, to be clear, was not part of the ISE report above. But Knox and his company bring key perspectives to the conversation -- since Passportal focuses its entire password management business of MSPs, MSSPs and cybersecurity channel partners.
“I would suggest that while some password managers can be manipulated on an active user’s computer to find password information, the vulnerability relies on authenticated access to both the computer and password manager itself. Overall, password tools remain a smarter security practice paired with MFA, opposed to storing credentials in systems that are more susceptible and don’t adhere to best-practice password hygiene, such as storing credentials in spreadsheets, sticky notes, plain text files, emails, or other tools .
In the case of an MSP or MSSP, they are responsible and accountable for hundreds, if not thousands, of passwords to the most privileged, sensitive accounts and client data that, if breached, could take down an entire network of businesses. It is also time to de-myth the safety of storing critical credentials in a PSA, RMM, or documentation tool. Such tools do not provide granular access control with immutable auditing and tracking, no knowledge data encryption, and password change automation, leaving the MSP at high-risk when it comes to technician turnover, client compliance requirements, or if compromised by malware/ransomware through phishing attacks.
With the ever increasing target on MSPs by hacking organizations like APT10, time is now of the essence for MSPs to get their houses in order and recognize that client security starts at home, securing their own systems, credentials, and other privileged client knowledge.”