May 4, 2017 By Douglas Bonderud 2 min read

Consumers are bad at passwords. So are companies, and they’re also bad at mandating effective authentication. As a result of this poor cyber hygiene, end users are at greater risk of having personal data stolen or accounts compromised, while businesses could face costly and time-consuming PR and remediation efforts.

As noted by Dark Reading, World Password Day is May 4, offering an ideal time for organizations and employees to take a hard look at bad cyber habits and clean up their acts.

Rolling the Dice With Poor Passwords

Passwords have been on the cyber chopping block for years now. But in the same way new communication tools can’t seem to knock email out of top spot, passwords remain the go-to for most e-commerce accounts, social platforms and corporate networks.

The problem is that users are really bad at choosing decent passwords. For example, Forbes reported that the most popular passwords in 2016 were “123456” and “password.” Alarmingly, these passwords also topped the list in 2015 and 2014.

The Dark Reading piece, meanwhile, noted that 70 percent of end users have seven or fewer passwords across all their online accounts, so it’s no surprise that 81 percent of hacking-related breaches examined by the “2017 Verizon Data Breach Investigation Report (DBIR)” tapped weak or stolen passwords. Even IT security pros aren’t off the hook, with 53 percent still using the same social network passwords they did last year, while 20 percent have never changed their passwords.

On the corporate side of the equation, many companies still aren’t using multifactor authentication (MFA). The DBIR described this as “rolling the dice” when it comes to device compromise from reused access credentials.

Cleaning Up for World Password Day

Ars Technica recently pointed out some less-than-stellar authentication designs. Its example not only allowed four-character passwords, but it also sent users a PIN in plaintext via email. What’s more, there was no mechanism to reset credentials, meaning that even if a breach occurred, users are stuck with the same problematic password.

Add in the predilection of users to select easy-to-remember and easy-to-guess passwords, then reuse them across multiple sites and never change them, and it becomes clear that even the necessary attention drawn by World Password Day won’t be enough to solve this security issue.

So what’s the solution? First, companies need to recognize that passwords won’t disappear overnight; better management is required to limit theft and reuse. Ideally, businesses should balance the need for better security hygiene with user convenience. It’s a good idea, for example, to require at least eight characters for any password, including one number or symbol. Then leverage controls that prevent employees from reusing passwords and restrict access unless passwords are regularly changed.

The next step is adaptive authentication. The idea here is to tap emerging authentication protocols, such as biometric tools and location-specific identifiers, and combine them with open source initiatives to develop universal, adaptable and secure standards that provide maximum convenience across multiple devices without compromising corporate security.

Scrubbing Out Poor Passwords

Passwords are a big problem. Users make terrible choices, and companies often overlook bad habits in favor of enterprise expediency. But cybercriminals are cleaning up, using and reusing bad passwords to compromise accounts.

World Password Day calls out the need for better cyber hygiene, but that’s only half the battle. Adaptive authentication, combined with evolving open standards, are required to help scrub out this security issue.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today