Insider Intelligence: Enhance Your Password Hygiene

Nov. 19, 2024
Don’t wait for a breach to realize you need to step up your defenses

This article originally appeared in the November 2024 issue of Security Business magazine. Don’t forget to mention Security Business magazine on LinkedIn and @SecBusinessMag on Twitter if you share it.

Let’s be real – passwords alone just aren’t cutting it anymore. We have all been told to create complicated passwords with numbers, symbols, and uppercase letters, but even the strongest passwords can be hacked, stolen, or phished.

As someone who’s been working in cybersecurity for years, I can tell you that sticking to passwords alone is like locking your front door but leaving your windows wide open.

If you are in the physical security or AV world, you already know how important it is to keep things secure. The same logic applies to protecting your business online. Here are five secure methods to consider:

1. Multi-Factor Authentication (layers of protection):

Think of MFA as locking the door, setting the alarm, and adding security cameras all at once. MFA requires more than just a password to get in. Maybe you enter a code from your phone or use your fingerprint. The idea is that even if someone steals your password, they will still hit a brick wall when trying to access accounts.

2. Use passkeys:

Imagine never needing to remember or type a password again. Passkeys use secure digital keys that are stored on a device like a phone or computer. When you log in, your device does the work behind the scenes, securely verifying who you are. No password, no stress, and because no password is exchanged or stored, hackers have nothing to steal.

3. Biometric authentication:

You have probably unlocked your phone with your face or fingerprint. The biometric method is more secure because no two people have the same biometrics. If employees are already using this technology on their phones, why not bring that level of security to business systems?

4. Hardware security keys:

Imagine having a physical key that unlocks digital accounts. Hardware security keys work like that – you plug it into a device, and it proves you are the right person. These little devices are practically impossible to phish, making them one of the most secure ways to authenticate and perfect for companies handling sensitive data or high-value accounts.

5. Behavioral biometrics:

Behavioral biometrics look things like how fast someone types, how they move a mouse, or even how they touch a screen. If someone tries to log in as that person, but their behavior doesn’t match, they’ll get blocked. It’s like having a security guard watching how you work and making sure no one tries to impersonate you.

It’s time to think about the future of your company’s security. Don’t wait for a breach to realize you need to step up your defenses. If you are ready to explore better ways to safeguard your business, consider these modern methods. Stay informed, stay protected, and stay ahead.

About the Author

Tyrone Chambliss

Tyrone Chambliss is an account manager for security integration company Northland Controls. He is also the Cybersecurity Committee Chair for PSA Security Network.  

www.northlandcontrols.com    https://psasecurity.com