The dreaded message “your password needs to be reset,” is something we all detest seeing on our computer screen. And the rules for recreating your new password make it even worse. A recent study showed that the average person has 27 logins that require a password, and we use about half of them per day. But are our passwords really secure? Technology is going to help us more than the password combinations that we keep forgetting or need to reset weekly.
Computer scientist Joel Lee explains, “passwords are all or nothing.” If someone has access to a password, they essentially have everything that is inside.
“It’s like having a padlock on a safe. All someone needs is a pair of bolt cutters and they can have whatever is inside.” Joel Lee
Instead of focusing on singular security challenges, organizations are narrowing in on the use of behavioral inputs. So it’s not about which letter you capitalized in your password or where you put an exclamation point but rather, how you hold your mouse, how quickly you swipe the screen, or generally, how you interact with your device.
Barclay’s Bank became one of the first companies to bring on voice technology for its customers. We probably say the cue REPRESENTATIVE more often than not on these bot calls, but investing in this advanced privacy is crucial. It actually is quite inexpensive compared to other privacy tactics as there is less hardware since most computers already have a built in mic.
This type of privacy tactic is on the rise. Think cell phones, car doors and building entrances. Even twins have a different set of fingerprints, so it’s a unique identification system. It’s also very hard to “forge” the ridges in a fingerprint.
This technology is much like using a camera, paired with infrared illumination to get rid of any reflection. It creates detailed images of the structure of the eye. Once converted and created into digital templates, it gives a mathematical sense of the eye that identifies individuals. In theory, this becomes a more accurate test than fingerprint scanning as the eye is an internal organ and protected throughout your lifetime, unlike your fingers. UAE ports of entry, Google and the FBI are all using this type of detection.
In May of this year alone, there were 17,273,571 records leaked. And password theft and data breaches are only going to increase unless we implement a change. Will biometrics be the answer?
“Our passwords are out there, in the black market, on the Dark Web,” Ayan Roy
No longer should we have to remember our 50 different passwords in combination with the 6 different emails we use. Let’s gear up for a passwordless future.
About The CISO Transformation Assembly
In a new digital world, driven by data, businesses of all sizes are working tirelessly to secure their networks, devices, and of course, their data. CISOs need to plan for worst-case scenarios, stay ahead of latest IT Security transformation technology, and maintain their company’s information assets without losing sight of the corporate culture.
This November, the 6th edition of our Transformational CISO Assembly will bring together industry leaders to discuss the latest strategies and innovations in cybersecurity in Miami. Join us today, the assembly is now open for application!