iTnews
  • Home
  • Features
  • Technology
  • Security

Do you know where your user IDs and passwords are?

By Bharat Nai on Aug 27, 2009 2:51PM
Do you know where your user IDs and passwords are?

Delfigo's Bharat Nai says it's time that most companies upgraded their access criteria.

Surprisingly, a majority of enterprises still use IDs and passwords as their only standard authentication criteria. This is true among many industries and companies of all sizes. Unfortunately, there are many reasons why this is no longer adequate in an enterprise environment.

Many enterprises, recognising the limitations of today's ID/password solution, have implemented "strong password" rules as a quick and cost-effective attempt to solve the issue.  These measures, however, don't really strengthen authentication or security -- since most people are unlikely to remember them permanently, they write them down or save them on soft media.  Instead of improving security, what this does is promote bad password management practices; so-called "strong passwords" impose hurdles by requiring people to remember complex passwords.

What is also true, but rarely addressed, is the fact that individuals often maintain the same passwords for multiple accounts. Such scenarios can lead to fraudsters gaining access to user IDs and passwords through stolen devices and other means.

A user ID and password-based authentication solution takes just a single factor into consideration when granting access to an individual. For example, let's say I successfully logged into my enterprise application using my user ID and password from my home office around 5pm. Later that day, say 8pm, there is an attempt to log in to my account using my credentials, only the request is this time coming from a location in Asia. Most systems do not take into account the impossibility for a non-astronaut to reach Asia in less than three hours to log in from the Asian IP location. Yet, systems that rely only on user ID and password grant access anyway.

Simply stated, authentication solutions must become intelligent, so they can validate the user, not just the machine. To do this, they must assess multiple identity factors to authenticate a user, and take into account the likes of keystroke dynamics, cognitive science, system parameters and geospatial parameters. This can enable the system to better understand the profile of users requesting access to a network or application and grant or deny access accordingly.

How should an enterprise deploy intelligent authentication? First, several key capabilities IT should be taken into consideration.  The intelligent authentication platform must be easy to use and should require no end user training. That is paramount, because one of the biggest challenges -- and time drains -- IT departments face is managing myriad help desk requests. The authentication solution must be easy to integrate with the existing IT infrastructure, and cost must be top of mind. Enterprises must look for solutions that fit within their budgets and are easily configured, deployed and managed.

The switch from a user ID and password authentication solution to an intelligent one will not happen overnight. But with the right amount of planning and strategy, enterprises can be well on their way to having a solution in place that reduces fraud, helps ensure regulatory compliance, and prevents identity theft before it happens. In the meantime, do you know where your user IDs and passwords are?

Bharat Nai is the vice-president of Delfigo Security.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
accessauthenticationcorporatecriteriaidloginpasswordsecurityuser

Partner Content

Winning strategies for complaints and disputes management in financial services
Promoted Content Winning strategies for complaints and disputes management in financial services
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Bharat Nai
Aug 27 2009
2:51PM
0 Comments

Related Articles

  • Twilio phishers went after Cloudflare, but failed
  • Samba attackers can force an admin password reset
  • Researchers identify FIDO2 protocol vulnerabilities
  • Password vulnerability fixed in Dell storage firmware
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

Google Cloud IoT Core goes on the end-of-life list

Google Cloud IoT Core goes on the end-of-life list

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Digital Nation

Crypto losses to crime surge to $1.9 B in first half of 2022: Chainalysis
Crypto losses to crime surge to $1.9 B in first half of 2022: Chainalysis
Stakes are higher for cybersecurity in Web3: Gal Tal-Hochberg, CTO at Team8
Stakes are higher for cybersecurity in Web3: Gal Tal-Hochberg, CTO at Team8
CommBank’s mobile banking app beats ANZ, NAB, Suncorp and Westpac: Forrester
CommBank’s mobile banking app beats ANZ, NAB, Suncorp and Westpac: Forrester
Edge and IoT critical to Web3 infrastructure
Edge and IoT critical to Web3 infrastructure
Save the Date — Digital Nation Live launches on October 25
Save the Date — Digital Nation Live launches on October 25
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.