Why You Must Have Your Own Login Credentials

As cybersecurity becomes more of a concern every day TextPower is taking steps to protect you and your data.  We already offer two-factor authentication authentication using our own patented technology, TextKey™, and soon it will be mandatory for all users.  

TextKey™ uses your cell phone as part of the authentication process and there can only be only one user ID associated with a cell phone number - and only one cell phone number associated with each user ID.  When TextKey™ becomes mandatory it will be impossible for you to share credentials (i.e., you and someone else both login with the same ID and password).  Everyone will need their own ID.  We are happy to create as many user IDs as you need in order to accommodate this change in the way logins are handled. Just send an email to Support@TextPower.com requesting your own ID, telling us which ID and password you've been using up to now (as verification) and we will handle the rest.  

It's important to note here that there are many more reasons not to share credentials than just TextPower requiring two-factor authentication.  Allowing users to share credentials poses several disadvantages and dangers from a cybersecurity perspective:

  1. Lack of accountability: When users share credentials, it becomes difficult to attribute actions or activities to specific individuals. This lack of accountability makes it challenging to investigate security incidents or track down the source of unauthorized access.
  2. Compromised access control: Sharing credentials increases the likelihood of unauthorized access to sensitive information or systems. If credentials fall into the wrong hands or are shared with unauthorized individuals, it becomes easier for attackers to gain entry and carry out malicious activities.
  3. Weak password practices: When users share their credentials, they may also share poor password practices, such as using weak or easily guessable passwords. This weakens the overall security posture of the organization, as attackers can exploit these weak passwords to gain unauthorized access.
  4. Difficulty in revoking access: If a shared set of credentials needs to be revoked or changed, it becomes challenging to ensure that all individuals who were previously sharing the credentials are no longer using them. This can lead to residual access rights, creating potential security vulnerabilities.
  5. Compliance and regulatory issues: Sharing credentials can also create compliance and regulatory challenges. Many industry standards and regulations require organizations to have proper access controls in place, and allowing users to share credentials can be seen as a violation of these requirements.
  6. Difficulty in enforcing security policies: Sharing credentials undermines the ability to enforce security policies effectively. For example, if multiple individuals are using the same credentials, it becomes challenging to implement individual user-based security measures, such as multi-factor authentication or user-specific access restrictions.

Overall, allowing users to share credentials significantly weakens your cybersecurity position as well as ours because it increases the risk of unauthorized access, data breaches, and compliance violations. We are enforcing these strict access control policies to help prevent that.