• About
  • Subscribe
  • Contact
Sunday, May 11, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Resources Blogs

Maximising passwords for cybersecurity

Melinda Baylon by Melinda Baylon
October 17, 2023
Image by Gino Crescoli from Pixabay

Image by Gino Crescoli from Pixabay

Share on FacebookShare on Twitter

A majority (58%) of organisations still use username-password combinations, making it the most widely deployed form of authentication according to an S&P Market Intelligence report. 

“Passwords continue to reign supreme as organisations struggle to balance security with simplicity, cost of ownership, and flexibility– particularly in hybrid working environments,” said Darren Guccione, CEO and co-founder of Keeper Security. 

Darren Guccione

 Securing passwords

New York University (NYU) acknowledged how strong passwords can keep data and information safe and recommended creating strong passwords to ensure cybersecurity. 

A strong password has 4 criteria—long, complex, unique, and secret. The educational institution recommends passwords that are 14 characters long, with varying character usage and alternating between uppercase, lowercase, numbers, and special characters. NYU suggests changing passwords once a year or 90 days for high-security accounts. 

Reusing previous passwords or using variations of the same passwords are red flags to cybersecurity. NYU does not recommend using easily-guessed patterns and numbers such as the user’s birthday, full name, or keyboard patterns like ‘qwerty’. In terms of computer safety, NYU reminds users to never allow internet browsers to remember passwords and to never leave their computers unlocked or unattended. 

A Norton study finds that in 2022, more than 24 billion passwords were compromised by malicious players. Additionally, more than 80% of cybersecurity breaches were caused by stolen, weak, or reused passwords. 

Password management

Password management policies are highly encouraged for organizations to strengthen security by creating, rotating, and storing, not only passwords but also 2FA and MFA codes. 

“As password and username combinations will remain a key part of the enterprise landscape for the foreseeable future, password management solutions that integrate and support a wide range of authentication methods, whilst ensuring security and cyber hygiene, will be important for all organisations to boost cyber resilience,” adds Guccione.

Related:  Increased resources and effort, tech leaders’ biggest concern to zero trust

Next to passwords, the S&P Market Intelligence report revealed that the most popular forms of authentication are mobile push-based MFA (47%), SMS-based MFA (40%), and biometrics (31%). 

Tags: Keeper Securitypasswordpasswordless authentication
Melinda Baylon

Melinda Baylon

Melinda Baylon joins Cxociety as editor for FutureCIO and FutureIoT. As editor, she will be the main editorial contact for communications professionals looking to engage with aforementioned media titles. 

Melinda has adecade-long career in the media industry and served as TV reporter for ABS-CBN and IBC 13. She also worked as a researcher for GMA-7 and a news reader for Far East Broadcasting Company Philippines. 

Prior to working for Cxociety, she worked for a local government unit as a public information officer. She now ventures into the world of finance and technology writing while pursuing her passions in poetry, public speaking and content creation. 

Based in the Philippines, she can be reached at [email protected]

No Result
View All Result

Recent Posts

  • Legacy systems may be sabotaging bank's cyber resilience posture
  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl