Is the password on the brink of extinction?
Editor Introduction
For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protecting access to computer systems. Nowadays, newer, more sophisticated forms of user identification and authentication have emerged on the scene. We asked this week’s Expert Panel Roundtable: Is the password on the brink of extinction in physical security? Why or why not?
The future is guaranteed to be password-less. Users loathe passwords almost as much as security experts. Trying to remember complex passwords causes users to often write passwords down or save them on a computer, making them even more vulnerable. Generic usernames and passwords are often used for maintenance or admin accounts, and reused passwords often end up in password lists used by hackers. Passwords represent a critical vulnerability in networks and are one of the most common attack vectors. The two most damning statistics on passwords are: 80% of hacking-related breaches are due to lost or stolen passwords, and 75% of users say that they are frustrated by trying to maintain them. Passwords will be likely replaced by some combination of zero trust authentication using context-based analysis, one-time pad plus pin codes with apps that constantly generate new keys, physical or app-based tokens in conjunction with a mobile device, and biometrics.
With a staggering 80% of cyber-attacks due to password breaches, the prospect of a password-less world is appealing. Imagine a life where no one would have to remember unique eight-character sequences or constantly update passwords to stay ahead of hackers and keep data secure. While tech giants such as Apple, Google, and Microsoft are already taking steps for this to become a reality, it will likely still be some time before passwords are completely extinct. In the meantime, we should rely more on multi-factor authentication and other alternatives such as certificate-based authentication and biometrics for additional layers of protection beyond a password. Furthermore, since passwords are meant to authenticate humans, not machines, they shouldn’t be the first choice to authenticate one system to another.
While passwords will likely be with us for a while yet, it’s certainly not because they are loved and respected as a trusted method for authenticating humans and machines. It’s no real surprise that passwords are a principal cause of cyberattacks since, when users don’t like them, they are bound to take shortcuts, storing them insecurely or reusing and sharing them. Likewise, some installers are known to do the same, because they feel the risk is low—until one day it isn’t. Meanwhile, there are myriad better ways to authenticate humans using more trusted and secure methods, be it biometrics and/or any number of combinations involving trusted private and public keys on our mobile devices using authentication apps or physical tokens. Until we get to the eventual password-less future, multi-factor authentication should be used whenever possible. Passwords aren’t on the brink of extinction just yet, but they probably should be.
Editor Summary
If you are counting the days until the end of the password as we know it, prepare yourself for a lengthy wait. Imperfect as they are, passwords are likely to continue to be a go-to method of protecting access to computer systems for the foreseeable future. If we could just stop writing them down on Post-it notes affixed to our computers!
- Related companies
- Genetec, Inc.
- Interface Systems LLC
- i-PRO
- Related links
- ANPR Software CCTV software
- Biometric Access control software
- Broadcast Messenger Access control software
- Detection Software CCTV software
- Contact Access control software
- Mifare Access control software
- IP Surveillance Software CCTV software
- Carpool Anti-passback Access control software
- Central Monitoring Option Access control software
- Management Software CCTV software
- Recording Software CCTV software
- Combined online/offline solution Access control software
- Surveillance Software CCTV software
- Door Monitoring Option Access control software
- Face Recognition Software Access control software
- License Access control software
- Management Systems Upgrade Access control software
- Redundant System Software Access control software
- Reporting Option Access control software
- Server software for MSDE Access control software
- Visitor Management tool Access control software
- Genetec Access control software
- Genetec CCTV software
- Related categories
- CCTV software
- Access control software
- View all news from
- Genetec, Inc.
- Interface Systems LLC
- i-PRO
Expert commentary
Security beat
Security bytes
- Getting to know Dan Grimm, VP and General Manager of Computer Vision at RealNetworks
- Big wins and the importance of showing up: Insights from SourceSecurity.com editor Larry Anderson
- Setting goals, business travels and radioactivity: Success secrets from Tiandy's John van den Elzen
- Getting to know Jeff Burgess, President/CEO at BCDVideo
Mobile access articles
HID, a worldwide pioneer in trusted identity solutions, announces the expansion of its signature line of Signo™ Readers to include models that meet varying customer needs – from harsh cond...
Signo Express and Seos Essentials provide a comprehensive, affordable access control solution designed for small to mid-sized businesses. This suite maximises security and flexibility without complex...
Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, announced it will acquire Clumio, a technology pioneer in data protection for critica...
As part of the company’s ongoing efforts to continue innovating to deliver the highest quality product offerings for the fast-changing security industry, Axis Communications is exhibit...
ASSA ABLOY Opening Solutions returns to Global Security Exchange (GSX) for 2024's powerhouse get-together of security professionals from around the world. Digital access control Attendees can visit...
Salient announced CompleteView v7.5, the latest update to its industry-leading video management platform. This version introduces improvements to operator experiences as well as major new enterprise c...
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous t...
Radiofrequency (RF) technology specialists, SPX Communication Technologies launched Evenlode Lite, an entry-level video downlink system designed for regions new to airborne surveillance or those looki...
Wavelynx Technologies, a trailblazer in advanced, secure, and versatile reader and credential solutions, announced the launch of its industry-first app, Configure by Wavelynx, to revolutionise th...
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the launch of Operations Centre, a cloud-based work m...
Hanwha Vision, the global vision solution provider, has released the XRN-426S-1T recorder - a compact NVR with a built-in 1TB solid-state drive (SSD). The 4-channel recorder supports AI search, when...
Fences, gates, storage cages, racks, containers, tool cabinets, and other non-standard openings often require restricted access and greater control. In many cases, they are secured with mechanical loc...
IDEMIA Public Security North America, the global provider of convenient and trusted biometric-based solutions, including physical and digital secure credentialing in the U.S, is partnering with My Fam...
Wireless access control company, CellGate, has just announced a full family of digital Virtual Key options for Watchman® W480, W482, W461, W462, WXL and WXL2 multi-family models. CellGate’s...
ABLOY rose to the top of the list as Finland’s most valued brand of 2024, according to an annual survey by pollster Taloustutkimus. Market research company - Taloustutkimus surveys Finnish consu...
The 2024 state of physical access trend report
DownloadThe security challenges of data centers
DownloadSecurity practices for hotels
DownloadSIA Identity and Biometrics Symposium
DownloadGunshot detection
DownloadDahua WizSense 2 Series AI-enhanced network camera
Hikvision AX HOME Series wireless alarm system
Climax Technology TouchPanel-3