No Password Is Too Complex For Hackers

Another huge data breach and another reason that the current password security system for business applications and websites is flawed. 

This time it was 412 million reasons, this being the number of accounts and user credentials that were exposed following the breach of FriendFinder Networks

According to LeakedSource, which acquired a copy of the leaked data set of the FriendFinder Networks breach, a million of the accounts have the password “123456” and more than 100,000 have the password, “password”. Despite people being continuously urged to be more diligent when it comes to password management, the issue is still being ignored and, in turn, breaches continue to happen.

Inconveniency of passwords

This is the latest in a long line of breaches that demonstrates the risks and consequences of using passwords as a means of authentication. Complex passwords are inconvenient, meaning users often avoid them in the first place or even store them or write them down elsewhere, offering more opportunity for them to be stolen. 

As a result, the password usability problem has worsened in recent years, so in order to maintain the stringent control necessary over the data that flows through organisation, IT leaders need to be adopting tools that address the major security issues at hand instead of continuing to operate under a system of increasing password adoption.   

It is shocking to see the number of people in the recent FriendFinder data breach that used the two most common passwords, ‘123456’ and ‘password’. 

Considering the number of data-breaches we have seen this year alone and the millions of people that have been affected (7 per cent of the global population reportedly affected in the Yahoo hack), even though a complex password is not going to stop the issue, picking the two most common and easily guessable passwords is absurd.    

However, it doesn’t matter what the password is, IT and security experts continue to advise on the importance of changing passwords, how often the password needs to be changed, and finally what constitutes a complex password. 

The common occurrence in all of the above solutions is that, the password. It doesn’t matter how many times a person changes or alters their password they still remain the issue. What’s needed is a change in mind-set towards security and to completely revise the entire concept of the password.  

Mass market for stolen data

Aggravating the issue even further is the fact that passwords sell for good money, meaning criminals have plenty of incentive to steal or crack them. 

Society has transitioned into digital and this has created a massive market for stolen data, subsequently sending security experts scrambling to put out fires, all the while pleading with users to make their passwords more secure, and never quite truly extinguishing the flames. 

Complex and hard to guess passwords alone are not enough as they still present risks, as it’s easier and less expensive than ever for cyber criminals to crack them. Even a standard desktop PC can try billions of password combinations every second, and password lists and password-cracking software is widely available.   

Passwords are fundamentally flawed, not only because they are often easy to guess and are easily hackable, but they are also expensive to maintain with between 20 and 50 per cent of help desk calls being for password resets according to Gartner. 

The New EU Data Protection Regulation comes into force in 2018, data breaches could lead to fines as high as €20m or up to 4 per cent – whichever is greater, of a company’s global turnover if there is a breach. 

The GDPR is a heavyweight piece of legislation that will require organisations across the board to put a stricter focus on the way they handle data. 

In light of this, the introduction of the GDPR should act as a wake-up call for organisations to take full control of their data and revaluate security systems that are no longer suitable, which, considering the number of data breaches we keep seeing, has to mean a upheaval of the traditional system.    

Passwords, in one form or another, have existed as a means of security for millennia. And for most of their history, they’ve worked as advertised. But as with all technology, it needs a refresh and this refresh is long overdue if you compare it to the speed of which everything else in this industry changes.

More secure pastures needed

In order to overcome the issues associated with passwords, organisations should look to other more secure pastures. Stop wasting time and money changing passwords, making them more complex and then suffering the inevitable embarrassment and potential huge fines after suffering a data breach. It’s time to disrupt the traditional concept of passwords as a means of authentication. We are all unique but a password is never unique. 

What’s needed is an approach that involves no passwords at all. By way of example, combining unhackable security tokens with the latest technologies means that no passwords are ever created, stored or transmitted.

ITProPortal:          Yahoo Hack Affects 1 Billion Accounts:
 

« What Happened To The Blockchain Revolution?
Online Con Tricks Senior Executives Out of Millions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Romanian Association for Electronic Industry & Software (ARIES)

Romanian Association for Electronic Industry & Software (ARIES)

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

TechForing Ltd.

TechForing Ltd.

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

CyberNet Albania

CyberNet Albania

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.