Skip to Content
Help wanted sign
In The News

Cybersecurity: It's a roller coaster ride

December 10, 2015 / 2 min read

While updating our cybersecurity marketing materials at Plante Moran, I met with one of our graphic designers, Amanda Dine, to explain the state of the industry.  She took my words and created this image:

Infographic describing the state of cybersecurity

As you can see, she envisioned a roller coaster ride: sometimes you’re up, other times you’re upside down, and sometimes you might even feel like you’re in the dark. It can be really scary and, just when you think the worst is over, the floor can fall out from under you.

I think the designer nailed it. The roller coaster image is a great depiction of the state of cybersecurity.  Think about it: over the last 12 months, companies have made significant investments in cybersecurity, yet incidents are increasing and the impact is worsening.  Why is that?
  1. Our #1 defense is our #1 weakness
    We rely on passwords to grant access to systems and sensitive data — but passwords typically aren’t strong enough and can be easily cracked with online tools.  In 2015, after five years of research, professors at Carnegie Melon University released a paper on how passwords are cracked.  The report explains the core of the problem is ease of predicting human behavior.  For example, it’s common practice to replace the letter “S” in a password with “$.” When people do this, they think they’ve made their password stronger, but cracking tools recognize this behavior and account for it.
  2. Our #2 defense is our #2 weakness
    We rely on users to uphold security standards — but users can fall prey to phishing attacks, write passwords down, or provide too much information on social media.  We’ve even seen network administrators seek advice from online user groups with detailed descriptions of their company network.  Users will continue to be a weak link in cybersecurity.
Once we understand and accept these weaknesses, we can focus on taking passwords and users out of the equation. How? Biometrics. For example, users could be authenticated by an encrypted card, token, or their cell phone. The token would contain encrypted biometric information, like fingerprints or retina scans, to verify identity.  This process has many benefits, including:
Sound farfetched? It’s not. This technology is coming soon. If you don’t believe me, look at this video >>  (I’m not endorsing the company or product, but this gives good insight into the future of safe authentication.)

I can’t wait for the day passwords and users are no longer our primary defenses against cybersecurity. Once biometrics take hold, we can finally step off of the rollercoaster, as our identities will reside safely with us and not in the hands of multiple corporate and online sources. 

This content originally appeared at crainscleveland.com and is part of a special blog series on cybersecurity.

Related Thinking

Medical professional looking at scans on a computer.
March 21, 2025

Proceed with confidence: Fundamental strategies to secure medical devices from cyberthreats

Article 4 min read
Group of nonprofit professionals in a meeting.
Feb. 26-Mar. 19, 2025

2025 Nonprofit Summit

Webinar 4 hour watch
Medical device professionals at work.
March 13, 2025

Navigating cybersecurity challenges for medical device suppliers

Article 4 min read