Wednesday, June 7, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

The headache of changing passwords

Researcher by Researcher
February 2, 2023
in Cybersecurity
0
The headache of changing passwords
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Passwords that are too simple on sticky notes.
Image: Vitalii Vodolazskyi/Adobe Stock

Passwords are problematic. They are arguably the weakest link in security, a leading cause of breaches, and difficult to manage. Yet, on Change Your Password Day 2023, passwords remain ubiquitous.

Instead of continuously changing passwords in an attempt to stay ahead of online threats, the best solution is no passwords at all. Adopting passwordless authentication can solve the inherent problems of passwords to deliver stronger security and a better user experience.

Related articles

Ransomware, DDoS see major upsurge led by upstart hacker group

DDoS attacks dominate and pretexting lead to BEC growth

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023

Consider the all-too-common practice of using repeated passwords. We still live in a world where the importance of unique passwords for every account cannot be overstated. Why? If one account is compromised, bad actors can easily get into other accounts tied to the same username or email.

Jump to:

Poor password policies lead to poor password practices

But, the reality of poor password practices like this is that the average person has roughly 191 different logins, passwords or other credentials to manage — meaning it requires too much effort to remember, paired with an “it won’t happen to me” mentality. As a result of human nature, many people will re-use existing passwords or adopt bad practices, such as writing down passwords on sticky notes.

SEE: 8 best enterprise password managers of 2022 (TechRepublic)

People have also been coached to use passwords that meet baseline complexity requirements while still being “easy” to remember. These complexity bare minimums are often well-intentioned, but create passwords that are hard to recall.

Hackers can also guess or crack them using specialized password attack tools. In fact, NordPass published a report containing the top 200 most common passwords according to 2021 research, citing millions of individuals using the same easy-to-remember password.

Must-read security coverage

To combat this tendency, some organizations push more frequent password changes on their users. But, this only compounds the problem. It increases the likelihood that users will write down their passwords, use the same password across multiple sites, forget their passwords altogether or in a truly poor experience, make the user call a help desk. It can also undermine productivity by forcing both users and administrators to dedicate more time and effort to password maintenance.

Sharing passwords is another reckless practice. It’s commonplace for consumers to share passwords — just think of the various streaming services — with their family and friends in an effort to save on costs. While this may seem harmless, sharing passwords makes it impossible for IT teams to know who is truly accessing the application and to have protections in place against non-verified individuals.

The same threats hold true when using the same username. Usernames are often common or shared publicly, meaning they have little security value. For example, someone’s social media handle could be the same username they use across different platforms and services. These redundancies make your digital footprint easier to map and exploit than if each account was unique.

A passwordless future

This is where passwordless technology and streamlined experiences come into play. Passwordless authentication generally relies on a possession factor (something you have like a mobile device) or an inherence factor (something you are like face or fingerprint biometrics) to verify user identity with greater assurance and convenience.

For consumers, passwordless improves engagement, makes logging in easy and makes the overall experience seamless and secure. This drives higher revenues because great digital experiences lead to long-term loyalty.

Consider that 46% of consumers prefer sites that offer alternatives to passwords and 53% feel better when using multi-factor authentication to sign into sites or services. Customers are already familiar with passwordless biometric logins on their smartphones. By offering passwordless authentication, businesses can not only improve customer experiences but also reduce abandonment rates and improve their bottom lines.

For employees, less time entering and resetting passwords means higher productivity and significantly less strain on help desks, which reduces costs. The security benefits are also clear: 82% of breaches involve brute force attacks or the use of lost or stolen credentials. Removing reliance on passwords provides a clear solution to better security and user experience.

SEE: Password breach: Why pop culture and passwords don’t mix (free PDF) (TechRepublic)

Passwordless technology is readily available today, but adoption is still low. That’s because passwordless is not a single solution, but rather one that requires integrations of multiple products and technologies while providing options to users. Also, it’s not simply an IT or security decision but a key business initiative that requires buy-in from various leaders throughout an organization.

The journey to passwordless is not short, but there’s a clear roadmap to reaching that goal. Organizations should start with the basics: centralized authentication based on username and password plus intelligent MFA to provide a single sign-on experience.

Progress continues by phasing out passwords using risk services and biometrics that support continuous, adaptive authentication. The home stretch of eliminating passwords brings in the use of FIDO-certified products and trusted devices as well as identity proofing.

Paving the way to passwordless adoption

A passwordless future results in stronger security, better user experiences and greater productivity. While progress is being made, it will take some time for passwordless to reach mass adoption. Until then, it’s critical to practice good password hygiene: change passwords regularly, use a unique password for each account, leverage a password manager to help keep track and opt into MFA.

Aubrey Turner.
Aubrey Turner

Aubrey Turner, Executive Advisor at Ping Identity, has an extensive background successfully delivering strategic, enterprise cyber security solutions to Fortune 1000 companies that addresses business problems, strengthens organizations, reduces risk and delivers positive business outcomes. Aubrey has demonstrated rapport and consensus building with key stakeholders. Additionally, he has proven leadership, communication, management, collaboration and sales skills.



Source link

Tags: changingheadachepasswords
Share76Tweet47

Related Posts

Ransomware, DDoS see major upsurge led by upstart hacker group

DDoS attacks dominate and pretexting lead to BEC growth

June 7, 2023
0

In Verizon’s just-released 2023 Data Breach Investigations Report, money is king, and denial of service and social engineering still hold...

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
0

North Korean threat group Kimsuky has recently launched a social engineering campaign against a number of experts specializing in North...

Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023
0

Open source password manager KeePass was updated over the weekend to patch a vulnerability allowing attackers to retrieve the cleartext...

Zero-day MOVEit Transfer vulnerability exploited in the wild

Zero-day MOVEit Transfer vulnerability exploited in the wild

June 6, 2023
0

Shodan search engine results for internet-facing MOVEit instances. Image: Shodan The Cybersecurity & Infrastructure Security Agency has issued an alert...

New DDoS Attack Vector Abuses Content Filtering Systems

UNC4857 Exploits MOVEit Transfer Flaw in Data Extortion Attacks

June 6, 2023
0

A newly discovered threat campaign has been observed exploiting the recently uncovered, critical-severity MOVEit Transfer vulnerability in order to launch...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Ransomware, DDoS see major upsurge led by upstart hacker group

DDoS attacks dominate and pretexting lead to BEC growth

June 7, 2023
Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023
Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023

Recent Posts

Ransomware, DDoS see major upsurge led by upstart hacker group

DDoS attacks dominate and pretexting lead to BEC growth

June 7, 2023
Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023
Release date, price and more

Release date, price and more

June 7, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved