Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 21 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Citrix data breach demonstrates we need to move beyond passwords

by The Gurus
June 22, 2016
in Editor's News
Share on FacebookShare on Twitter

Citrix is just the latest in a long line of companies to have fallen victim to a data breach, after users’ passwords were compromised following a ‘sophisticated data breach’. The news should act as a reminder for organisations and individuals to move beyond passwords, according to Dave Worrall, CTO at Secure Cloudlink, who argues the weaknesses presented by passwords are consistently being ignored.

Worrall explains: “Given the severity and regularity of data breaches, it’s clear that the current approach to passwords still presents major vulnerabilities. A strong password alone is not enough to protect an individual or an organisation from a malicious attack. This has been demonstrated time and time again by the rise in breaches across web platforms such as LinkedIn, MySpace and Tumblr that resulted in email credentials for sale online. There is now an enormous market for stolen data, which means good security hygiene is more crucial than ever. Despite IT departments and security experts urging users to be more diligent when it comes to password management, hacks and breaches continue to occur.

“Complex and hard to guess passwords alone are not enough as they still present risks. If a site is hacked or passwords are not stored in an encrypted formatted, high-risk data still has the potential to be compromised. What’s more, passwords can still be stolen and the encryption broken.

“The password usability problem has worsened in recent years. Complex passwords are inconvenient, meaning users often avoid them in the first place. And the fact that a simple graphics card can crack a strong password only exacerbates the password problem. Recent developments to mitigate the issue include single sign-on and password managers. Also, while biometrics and hashing passwords may improve the user experience by adding a new level of security user credentials, this doesn’t remove the use and transmission of passwords and credentials in the background. 

“The Citrix data breach should serve as a wake up call to the vulnerabilities presented by the password security system. Although this approach was suitable some time ago, we’ve progressed into an increasingly digital environment, which means passwords have evolved into an indefensible means of authentication. What’s needed is a change in mind-set towards security and to completely revise the entire concept of the password, as it’s simply a vulnerable protocol. The faster we embrace solutions that tackle this problem the better chance we have of mitigating data breaches,” concludes Worrall.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

41% of mid-size EU businesses at risk of breaching incoming data privacy laws by keeping all information ‘just in case’

Next Post

UK Will Be More Vulnerable to Cyber Attacks if It Leaves the EU, says IT Security Industry

Recent News

Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023
New AT&T Cybersecurity USM Anywhere Advisors Service Helps to Establish and Maintain Threat Detection and Response Effectiveness

Should Your Organization Be Worried About Insider Threats?

March 17, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information