Skip to Content

Cybersecurity: It's a roller coaster ride

December 10, 2015 In The News 2 min read
Authors:
Joe Oleksak
While updating our cybersecurity marketing materials at Plante Moran, I met with one of our graphic designers, Amanda Dine, to explain the state of the industry.  She took my words and created this image:

Infographic describing the state of cybersecurity

As you can see, she envisioned a roller coaster ride: sometimes you’re up, other times you’re upside down, and sometimes you might even feel like you’re in the dark. It can be really scary and, just when you think the worst is over, the floor can fall out from under you.

I think the designer nailed it. The roller coaster image is a great depiction of the state of cybersecurity.  Think about it: over the last 12 months, companies have made significant investments in cybersecurity, yet incidents are increasing and the impact is worsening.  Why is that?
  1. Our #1 defense is our #1 weakness
    We rely on passwords to grant access to systems and sensitive data — but passwords typically aren’t strong enough and can be easily cracked with online tools.  In 2015, after five years of research, professors at Carnegie Melon University released a paper on how passwords are cracked.  The report explains the core of the problem is ease of predicting human behavior.  For example, it’s common practice to replace the letter “S” in a password with “$.” When people do this, they think they’ve made their password stronger, but cracking tools recognize this behavior and account for it.
  2. Our #2 defense is our #2 weakness
    We rely on users to uphold security standards — but users can fall prey to phishing attacks, write passwords down, or provide too much information on social media.  We’ve even seen network administrators seek advice from online user groups with detailed descriptions of their company network.  Users will continue to be a weak link in cybersecurity.
Once we understand and accept these weaknesses, we can focus on taking passwords and users out of the equation. How? Biometrics. For example, users could be authenticated by an encrypted card, token, or their cell phone. The token would contain encrypted biometric information, like fingerprints or retina scans, to verify identity.  This process has many benefits, including:
  • Biometric information wouldn’t be stored on corporate or online systems but would reside on the user’s card or phone.
  • Security wouldn’t be compromised if the card or phone were lost or stolen because the user’s biometric information would be required to access information.
  • An encrypted card or phone is somewhat tamper proof considering it generates a new key code for each use.
Sound farfetched? It’s not. This technology is coming soon. If you don’t believe me, look at this video >>  (I’m not endorsing the company or product, but this gives good insight into the future of safe authentication.)

I can’t wait for the day passwords and users are no longer our primary defenses against cybersecurity. Once biometrics take hold, we can finally step off of the rollercoaster, as our identities will reside safely with us and not in the hands of multiple corporate and online sources. 

This content originally appeared at crainscleveland.com and is part of a special blog series on cybersecurity.

Related Thinking

Technology consultants discussing how to align digital strategy with business goals.
March 26, 2024

Digital strategy: A roadmap to align technology with business goals

Article 5 min read
Group of industry leaders attending Plante Moran's Nonprofit Summit.
March 26, 2024

2024 Nonprofit Summit

Webinar 4 hour watch
Scientist in a mask and hazmat suit working with a machine.
March 1, 2024

Top medical device industry issues to watch for in 2024

Article 5 min read