Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • Why is it Safer to Use a Prebuilt Platform for your Website?
    • Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity
    • 10 Strategies to Stop Ransomware Attacks
    • Rajiv Kulkarni Talks about the Malware Analysis Pipeline
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 27, 2022

      Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 26, 2022

      10 Strategies to Stop Ransomware Attacks

      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 27, 2022

      Why is it Safer to Use a Prebuilt Platform for your Website?

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

    TechSpective
    You are at:Home»Security»Data Protection»Passwords: A Fickle Yet Necessary Means to Security
    Password Day passwords data protection encryption
    Image from Pixabay

    Passwords: A Fickle Yet Necessary Means to Security

    0
    By Purandar Das on May 6, 2021 Data Protection, Encryption, Passwords

    Passwords. You can’t live with them and you can’t live without them. The advent of the web has created a veritable spider web for every individual. What was often a matter of remembering one or two passwords for your computer and your email account has now mushroomed to having to remember dozens of passwords, one for every account that you are signed up for. Also, the complexity of the passwords has increased exponentially, and rightfully so.

    Technology and the availability of stolen personal information has increased the odds of the wrong people being able to guess a password. The loss of a single password can have disastrous consequences, including the loss of one’s life savings or cause immeasurable damage to privacy. There have been countless articles written about the need to have a strong password and the need to avoid using attributes that are easily guessed. Two-factor authentication has become ubiquitous. However, the criminals have kept us on our toes, SIM spoofing is a genuine threat to two-factor authentication.

    Biometric identification is experiencing a big boom. The use of an individual’s biometric features for authentication has already been incorporated into our daily lives via iPhone security mechanisms, etc. The proliferation of smart devices has been both a boon and curse. Many consumers tend to use their smart device as the platform for their applications resulting in the storage of their credentials on their handsets. What protects their handsets? A password or passcode. Many companies are offering passwordless solutions. These usually rely on a device identifier that is controlled by biometric features. But almost all solutions are underpinned by a password. They make it easier but are not really eliminating the password.

    Another thing to keep in mind is the demographic. Each generation of users has developed practices that are hard to get over. The younger tech savvy generation can easily adapt to newer technologies. The older generation that has not had as much exposure to technology has a harder time with new technology. Biometric solutions are not infallible. They are usually stored as data points. This results in more data that can potentially be stolen in hacks.

    At the end of the day, passwords are not disappearing any time soon nor is there a really easy answer. Until we reach the point where technology provides an infallible solution, it is best to remember the basics, such as creating a unique password for each application, don’t share your passwords, create complex passwords, and most importantly, monitor account activity periodically!

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSam Curry Discusses Privacy, Data Ownership, and Business Continuity
    Next Article Blockchain & Higher Education: How Are They Connected?
    Purandar Das
    • Website

    Purandar Das, President, Co-Founder as well as the Chief Security Evangelist of Sotero (www.soterosoft.com) has focused on using technology to solve business problems. Throughout his career, Purandar has been working on utilizing technology to solve complex business challenges. He adopts a pragmatic approach that enables business to leverage technology to achieve business goals and power growth. Purandar started Sotero with the conviction that today’s data protection was deficient and that a better approach was needed to protect data. He is a firm believer that security, where the core focus is not the data, is not a viable option. Purandar is a graduate of Texas A&M University (MS – Mechanical Engineering) and Bangalore University (BS – Mechanical Engineering) and is based out of Massachusetts.

    Related Posts

    Cybersecurity Myths that are Compromising Your Data and How to Address Them

    Hybrid Working in the Age of Cloud and Open Source Security

    Surefire Ways to Boost PC Cybersecurity

    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 27, 2022

    Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Coffee and Politics
    PopSpective
    Adobe
    PopSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Adobe

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.