sb-au logo
Story image

Could passwords be past their use-by date?

For many companies, an over reliance on passwords could be putting their IT security at risk, says Centrify. 

Lachlan McKenzie, ANZ manager for Centrify, says the most disturbing observation of his first year in the job was the blind faith businesses were placing on passwords.

“The fact is that compromised credentials are the leading attack vector for data breaches globally,” says McKenzie.

McKenzie says that it basically just boils down to pure laziness.

“Because we’re expected to remember them, many people choose passwords that are easy to recall – to a ludicrous degree. Recent hacks reveal the most popular passwords include 123456, qwerty and, of course, password,” he adds. “Passwords also fail due to poor security habits, such as password sharing. Although we’re all warned not to share our passwords with family members or colleagues, people continue to do it.”

He says that the solution to this password problem is to use mature security standards such as SAML (Security Assertion Markup Language). Another way is to use multi-facto authentication.

“But the challenge is to encourage businesses to make this sort of protection a priority,” comments McKenzie.

Centrify is a global leader in securing enterprise identities against cyberthreats and it’s used by more than 5000 customers.

Just last month, Rémy Cointreau announced that it is using Centrify's identity management and mobile management platform to support its 1800 employees globally. 

McKenzie adds that Centrify's increased focus on Australia and New Zealand during the past year has attracted new resellers and established an Australian data centre. 

“Trends such as outsourcing, cloud, mobile and the strong desire to address compromised credentials have also fuelled demand for our solutions in Australia and New Zealand.” “It’s clear that Centrify is increasingly recognised as the leader in the identity protection space."

Story image
Fujitsu recognised a leader in Australian cyber security
"The company is well positioned to serve new businesses in the managed security services market in Australia."More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Link image
Phishing campaigns aren't stopping - but neither are their opponents
COVID-19 is presenting the perfect opportunity to cyber attackers to mount potentially devastating spear-phishing campaigns against organisations via their remote workers. Learn how to fight back.More
Story image
Report: Rushing into cloud migration directly related to security issues
A new report from Radware highlights the impact of COVID-19 on organisations compelled to digitally transform in order to maintain business continuity. More
Story image
Why securing IoT installations will be ‘do or die’ in post-pandemic Australia
Unless IoT technology is visible on the network, organisations will find themselves at risk with an unmanageable high-tech morass, warns ExtraHop A/NZ regional sales manager Glen Maloney.More