Are Passwords a Thing of the Past?

Digital Diary takes a look into the future of passwords, and systems that we are going to see in action going forward. With the large amount of data breaches and password theft, organizations are changing their security for higher level protection.

No comments

The dreaded message “your password needs to be reset,” is something we all detest seeing on our computer screen. And the rules for recreating your new password make it even worse. A recent study showed that the average person has 27 logins that require a password, and we use about half of them per day. But are our passwords really secure? Technology is going to help us more than the password combinations that we keep forgetting or need to reset weekly.

Computer scientist Joel Lee explains, “passwords are all or nothing.” If someone has access to a password, they essentially have everything that is inside.

“It’s like having a padlock on a safe. All someone needs is a pair of bolt cutters and they can have whatever is inside.” Joel Lee

Instead of focusing on singular security challenges, organizations are narrowing in on the use of behavioral inputs. So it’s not about which letter you capitalized in your password or where you put an exclamation point but rather, how you hold your mouse, how quickly you swipe the screen, or generally, how you interact with your device.

Voice Recognition

Barclay’s Bank became one of the first companies to bring on voice technology for its customers. We probably say the cue REPRESENTATIVE more often than not on these bot calls, but investing in this advanced privacy is crucial. It actually is quite inexpensive compared to other privacy tactics as there is less hardware since most computers already have a built-in mic.

Fingerprint Scanning

This type of privacy tactic is on the rise. Think cell phones, car doors and building entrances. Even twins have a different set of fingerprints, so it’s a unique identification system. It’s also very hard to “forge” the ridges in a fingerprint.

Iris Recognition

This technology is much like using a camera, paired with infrared illumination to get rid of any reflection. It creates detailed images of the structure of the eye. Once converted and created into digital templates, it gives a mathematical sense of the eye that identifies individuals. In theory, this becomes a more accurate test than fingerprint scanning as the eye is an internal organ and protected throughout your lifetime, unlike your fingers. UAE ports of entry, Google and the FBI are all using this type of detection.

In May of this year alone, there were 17,273,571 records leaked. And password theft and data breaches are only going to increase unless we implement a change. Will biometrics be the answer?

“Our passwords are out there, in the black market, on the Dark Web,” Ayan Roy

No longer should we have to remember our 50 different passwords in combination with the 6 different emails we use. Let’s gear up for a password-less future.

ABOUT THE TRANSFORMATIONAL CISO ASSEMBLY

The Millennium Alliance is thrilled to present our bi-annual Transformational ciso7 bannerCISO Assembly, taking place in Nashville, TN.

With the instances of cyber attacks increasing, businesses of all sizes are working tirelessly to secure their networks, devices, and data. Fortune 500 organizations are especially vulnerable as they have big data pools and thousands of people who need access. CISOs need to plan for worst-case scenarios, stay ahead of the

latest IT Security transformation technology, and maintain their company’s information assets, all without losing sight of the corporate culture.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s