Skip to Content
Help wanted sign
In The News

Cybersecurity: It's a roller coaster ride

December 10, 2015 / 2 min read

While updating our cybersecurity marketing materials at Plante Moran, I met with one of our graphic designers, Amanda Dine, to explain the state of the industry.  She took my words and created this image:

Infographic describing the state of cybersecurity

As you can see, she envisioned a roller coaster ride: sometimes you’re up, other times you’re upside down, and sometimes you might even feel like you’re in the dark. It can be really scary and, just when you think the worst is over, the floor can fall out from under you.

I think the designer nailed it. The roller coaster image is a great depiction of the state of cybersecurity.  Think about it: over the last 12 months, companies have made significant investments in cybersecurity, yet incidents are increasing and the impact is worsening.  Why is that?
  1. Our #1 defense is our #1 weakness
    We rely on passwords to grant access to systems and sensitive data — but passwords typically aren’t strong enough and can be easily cracked with online tools.  In 2015, after five years of research, professors at Carnegie Melon University released a paper on how passwords are cracked.  The report explains the core of the problem is ease of predicting human behavior.  For example, it’s common practice to replace the letter “S” in a password with “$.” When people do this, they think they’ve made their password stronger, but cracking tools recognize this behavior and account for it.
  2. Our #2 defense is our #2 weakness
    We rely on users to uphold security standards — but users can fall prey to phishing attacks, write passwords down, or provide too much information on social media.  We’ve even seen network administrators seek advice from online user groups with detailed descriptions of their company network.  Users will continue to be a weak link in cybersecurity.
Once we understand and accept these weaknesses, we can focus on taking passwords and users out of the equation. How? Biometrics. For example, users could be authenticated by an encrypted card, token, or their cell phone. The token would contain encrypted biometric information, like fingerprints or retina scans, to verify identity.  This process has many benefits, including:
Sound farfetched? It’s not. This technology is coming soon. If you don’t believe me, look at this video >>  (I’m not endorsing the company or product, but this gives good insight into the future of safe authentication.)

I can’t wait for the day passwords and users are no longer our primary defenses against cybersecurity. Once biometrics take hold, we can finally step off of the rollercoaster, as our identities will reside safely with us and not in the hands of multiple corporate and online sources. 

This content originally appeared at crainscleveland.com and is part of a special blog series on cybersecurity.

Related Thinking

Parents and their children smiling and taking a selfie.
July 2, 2024

Cybersecurity for families: 5 ways to help protect children and adults

Article 10 min read
CFO reading an article on their tablet and learning about the importance of privacy and security.
July 2, 2024

Hidden threats: The role of the CFO in privacy and security

Podcast 48 min listen
Two business professionals in casual clothing using a handheld tablet device together while standing.
June 18, 2024

Cybersecurity essentials for franchises: Prevent, respond, comply

Article 7 min read