SHARE
Facebook X Pinterest WhatsApp

Why ‘Password’ Is Still Used as a Password

May 15, 2015

It’s fairly obvious that cyber-threats are increasing–seemingly on an exponential scale. While much of the focus for CIOs is on the enterprise and locking down servers, networks and all the mobile devices used within the enterprise, customer-facing security too often takes a back seat.

Too many businesses continue to rely on nothing more than a user name and password. Few use two-factor authentication as well as more sophisticated technologies such as fingerprint authentication, facial recognition and randomly generated codes designed for one-time use. Making matters worse, the more complex the password scheme, the greater the odds that a sizeable chunk of the population will write down the password on a sticky note or use the same complex password over and over.

Even with password tools such as 1Password and RoboForm–and the password generation and management tools built into modern browsers such as Chrome, Firefox and Safari–it’s still a living nightmare. Many consumers simply toss up their hands and give up. The result? Passwords such as: 1234567 or password.

Then there’s the problem of phishing and other social engineering methods. A new report from CBS News and Intel Security found that of 19,458 people who took a quiz, 80 percent fell victim to at least one fake email. Only 3 percent managed a perfect score. Incredibly, 94 percent of security professionals were also fooled.

The message for CIOs, CISOs and CSOs? Organizations must put more time, energy and resources into devising security tools and systems that ratchet up protection on the customer side of the equation. One company that does an excellent job with log-on security is USAA, which requires a username, password and PIN. What’s more, its mobile app incorporates optional facial recognition and voice recognition–as well as fingerprint authentication. Many others, including American Express and Square, also offer fingerprint authentication on an iPhone.

Of course, biometric and other advanced authentication tools still require an underlying password. Yet, it’s far more attractive to create a strong password when you don’t have to type it into a cramped smartphone keypad every single time you log in.

Business, IT and security leaders should also consider adding two-factor authentication for any significant account changes. And there’s a need to focus on designing email messages that better authenticate the company. It’s still way too easy for scammers to create deceptive messages that look real. The CBS News and Intel Security study pretty much proves that. When the experts can’t tell real from fake, something is very wrong.

Recommended for you...

Ransomware Attacks: The Endless Horror Movie
Drew Robb
Dec 30, 2021
What Businesses Must Learn About Data Integrity From the IMF Controversy
Dan Adams
Dec 21, 2021
Succeeding in a Crowded MSP Marketplace
Drew Robb
Oct 11, 2021
Don’t Overlook IT Risk Compliance When Defending Against Cyberattacks
Richard Chambers
Sep 22, 2021
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.