![Lead Image © John McAllister, 123RF.com Lead Image © John McAllister, 123RF.com](/var/ezflow_site/storage/images/archive/2014/23/multifactor-authentication-from-fido/po-25503-123rf-john_mcallister_123rf-dobermann_hund__resized.png/104722-1-eng-US/PO-25503-123RF-John_McAllister_123RF-Dobermann_Hund__resized.png_medium.png)
Lead Image © John McAllister, 123RF.com
Multifactor authentication from FIDO
Watchdog
The recent discovery of a 1 billion+ password treasure trove in the hands of Russian cybercriminals brings home a far too common occurrence. Almost daily, you hear of a new breach and a new set of stolen credentials, a new pastebin dump, and millions of frustrated admins and end users. Beyond security breaches, other reasons to replace this nearly 50-year-old technology include:
- Users reuse passwords
- Users create weak passwords
- Users want ease of use
- Passwords are centralized in databases
In short, passwords are painfully antiquated, insecure, and clearly in need of an overhaul.
Real Risks/Real Costs
The costs of single-factor authentication are hardly theoretical and without significance. These are just a few real-world facts about password risks and costs:
- Forrester Research notes the cost of password breaches reached more than US$ 200 billion in annual losses.
- According to the Verizon 2013 Data Breach Report, weak or stolen credentials account for 76 percent of network intrusions, and more than 50 percent use some form of hacking.
- A 2013 SplashData study on data from an Adobe breach showed the top five most used passwords are: 123456, password, 12345678, qwerty, abc123. (Yes, you make take a moment to scream or hurl a heavy object!)
- According to Intercede, 51 percent of users share usernames and passwords with friends, family, and colleagues.
Unfortunately, many large players in the marketplace would rather keep their heads in the sand than face reality.
What is MFA?
It's time to face the facts that this more than 50-year-old love affair with the password should end. Admins need to look for what is next. That next step can and should address some of the key weaknesses of single-factor authentication.
...Buy this article as PDF
(incl. VAT)