We`re just sending through your details

Please give us a few moments whilst we get your account ready.


So Long Passwords, and Thanks for All the Phishing

So Long Passwords, and Thanks for All the Phishing

posted in Redstor ● 21 Jun 2016

Conventional passwords will become obsolete very soon. Bill Gates already predicted it in 2004, it’s not breaking news. The average consumer using electronic devices that connect to the internet has roughly 25 or more sites, apps and accounts that rely on conventional passwords in order to gain access and enable data protection. I think it is safe to say that the majority of individuals that have had the pleasure of creating a new password, or have used password generators, will welcome more modern forms of access control with open arms.


What is wrong with conventional passwords as a means of data protection?

“Through 20 years of effort, we’ve successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess.” (Explain XKCD, comic 936)

1.      Safety. The first, and most common flaw with strong passwords is remembering them, especially if you operate with password generators. In order to create a strong password that will not be easily guessed there are general guidelines. According to Microsoft, tips for creating strong passwords, when not using a password generator, are the following:

  • At least 8 characters long
  • Does not contain your user name, real name or company name
  • Does not contain a complete word
  • Is not similar to your other passwords
  • Contains, uppercase and lowercase characters, numbers and symbols

This is quite a list to take into consideration… and it leads to people doing an unspeakable thing: writing down passwords (like on a sticky note taped to the monitor). This makes them extremely vulnerable for security breaches and is not ideal when it comes to data protection.

2.      Inconvenience. All the guidelines mentioned above makes using a password, not to mention creating a new one, a bit of an annoying task. Conventional passwords, even though they are implemented to be our friend and protect us, becomes the enemy, and potentially the very cause of a security demise.

3.      Increasing number of different passwords. With the increasing number of accounts, apps, websites, devices that we use, the number of passwords required increases as well. And by now we know the big “no-no” in password land: don’t use the same password for more than one access control requirement, or else you jeopardise your data protection. You could make use of a password manager or a password generator in order to avoid “password fatigue”, however, you’ll probably need to remember your password to log into your password manager in order to gain access to your other passwords. 

But what is the alternative to relying on conventional passwords?

1.      Two-step verification. Two-step verification isn’t really an alternative. It’s more of a “double check” method. This access control method would have a two-step verification process consisting of “something you know” (the password), followed by either “something you have” (a security token or an OTP – one time pin) or “something you are” (this is discussed in the next point about Biometrics). Most often the second step would be in the form of a text message with a security token sent to your mobile phone.

2.      Biometrics. Remember whenthe film Minority Reportpremiered in 2002, and we all watched in amazement as the main character, Captain John Anderton, undergoes a risky eye transplant so he could evade the city-wide optical recognition system? We couldn’t fathom such technology actually being utilised commercially in real life. Well, it’s real. So real that Windows 10 has a feature called WindowsHellowhich makes use of fingerprint, facial and iris (or optical) recognition in order to grant access to your account. Biometrics replaces conventional passwords literally with “something that you are”. In theory, it’s a great idea for your data protection, but in practice biometrics remain flawed and impractical.

3.     Device authentication. Encrypting a device will help protect the data from being hacked. User authenticators is a technology which will confirm, by various means of artificial intelligence, that the person attempting to operate the device is the person that owns the device. A combination of two-step verification and biometrics are used: a pin, a security token, a physical characteristic like a fingerprint, and an “individual human characteristic”, like the way a user types, walks or holds the device.

When it comes to data protection, this is definitely the beginning of the end for conventional passwords. And the beginning of extraordinary alternative authentication processes.

Vital new role of AI in keeping backup data safe from malware

Vital new role of AI in keeping backup data safe from malware

Every day more than 350,000 new types of malware are unleashed on the internet. The scale of the problem is so massive, it is no longer enough to have traditional anti-virus software, solely defending against known threats.

Continue reading
Xero Data Backup

Why you should consider Xero Data Backup for your accountancy firm

Ignoring the need for a third-party backup is a major gamble. Xero’s own Services Agreement states: “You must maintain copies of all data inputted into the service. Xero expressly excludes liability for any loss of data no matter how caused.”
Continue reading

Survey on risk of data loss and cybercrime

Wondering how best to fend off new cyber threats? Curious about what your peers are doing?

Continue reading