No Password Is Too Complex For Hackers

Another huge data breach and another reason that the current password security system for business applications and websites is flawed. 

This time it was 412 million reasons, this being the number of accounts and user credentials that were exposed following the breach of FriendFinder Networks

According to LeakedSource, which acquired a copy of the leaked data set of the FriendFinder Networks breach, a million of the accounts have the password “123456” and more than 100,000 have the password, “password”. Despite people being continuously urged to be more diligent when it comes to password management, the issue is still being ignored and, in turn, breaches continue to happen.

Inconveniency of passwords

This is the latest in a long line of breaches that demonstrates the risks and consequences of using passwords as a means of authentication. Complex passwords are inconvenient, meaning users often avoid them in the first place or even store them or write them down elsewhere, offering more opportunity for them to be stolen. 

As a result, the password usability problem has worsened in recent years, so in order to maintain the stringent control necessary over the data that flows through organisation, IT leaders need to be adopting tools that address the major security issues at hand instead of continuing to operate under a system of increasing password adoption.   

It is shocking to see the number of people in the recent FriendFinder data breach that used the two most common passwords, ‘123456’ and ‘password’. 

Considering the number of data-breaches we have seen this year alone and the millions of people that have been affected (7 per cent of the global population reportedly affected in the Yahoo hack), even though a complex password is not going to stop the issue, picking the two most common and easily guessable passwords is absurd.    

However, it doesn’t matter what the password is, IT and security experts continue to advise on the importance of changing passwords, how often the password needs to be changed, and finally what constitutes a complex password. 

The common occurrence in all of the above solutions is that, the password. It doesn’t matter how many times a person changes or alters their password they still remain the issue. What’s needed is a change in mind-set towards security and to completely revise the entire concept of the password.  

Mass market for stolen data

Aggravating the issue even further is the fact that passwords sell for good money, meaning criminals have plenty of incentive to steal or crack them. 

Society has transitioned into digital and this has created a massive market for stolen data, subsequently sending security experts scrambling to put out fires, all the while pleading with users to make their passwords more secure, and never quite truly extinguishing the flames. 

Complex and hard to guess passwords alone are not enough as they still present risks, as it’s easier and less expensive than ever for cyber criminals to crack them. Even a standard desktop PC can try billions of password combinations every second, and password lists and password-cracking software is widely available.   

Passwords are fundamentally flawed, not only because they are often easy to guess and are easily hackable, but they are also expensive to maintain with between 20 and 50 per cent of help desk calls being for password resets according to Gartner. 

The New EU Data Protection Regulation comes into force in 2018, data breaches could lead to fines as high as €20m or up to 4 per cent – whichever is greater, of a company’s global turnover if there is a breach. 

The GDPR is a heavyweight piece of legislation that will require organisations across the board to put a stricter focus on the way they handle data. 

In light of this, the introduction of the GDPR should act as a wake-up call for organisations to take full control of their data and revaluate security systems that are no longer suitable, which, considering the number of data breaches we keep seeing, has to mean a upheaval of the traditional system.    

Passwords, in one form or another, have existed as a means of security for millennia. And for most of their history, they’ve worked as advertised. But as with all technology, it needs a refresh and this refresh is long overdue if you compare it to the speed of which everything else in this industry changes.

More secure pastures needed

In order to overcome the issues associated with passwords, organisations should look to other more secure pastures. Stop wasting time and money changing passwords, making them more complex and then suffering the inevitable embarrassment and potential huge fines after suffering a data breach. It’s time to disrupt the traditional concept of passwords as a means of authentication. We are all unique but a password is never unique. 

What’s needed is an approach that involves no passwords at all. By way of example, combining unhackable security tokens with the latest technologies means that no passwords are ever created, stored or transmitted.

ITProPortal:          Yahoo Hack Affects 1 Billion Accounts:
 

« What Happened To The Blockchain Revolution?
Online Con Tricks Senior Executives Out of Millions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Citicus

Citicus

Citicus provides world-class security, risk and compliance management software, plus supporting services.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.