{"id":5692,"date":"2013-02-05T17:04:39","date_gmt":"2013-02-05T17:04:39","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=9b8f52572522bb58bdc37f4aed732d0c"},"modified":"2013-02-05T17:04:39","modified_gmt":"2013-02-05T17:04:39","slug":"the-death-of-username-and-password-ten-truths-to-strike-fear-into-the-heart-of-service-providers","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/the-death-of-username-and-password-ten-truths-to-strike-fear-into-the-heart-of-service-providers\/","title":{"rendered":"The Death of Username and Password: ten truths to strike fear into the heart of service providers!"},"content":{"rendered":"<p>by, Brian Spector, CEO, Certivox<\/p>\n<p>&nbsp;<\/p>\n<p>When my team started to work on a paper about the vulnerabilities of usernames and passwords recently, I decided we would defy typical cryptography vendor behaviour. Instead of a technical whitepaper full of architecture diagrams and mathematical notation, I told my team I wanted them to do wide-ranging research to argue a <em>cause<\/em>, in order to support a <em>business case<\/em>. The material they researched became <a href=\"https:\/\/certivox.com\/death-username-password\/\"><strong><em>The Death of Username and Password<\/em><\/strong><\/a><strong>, <em>a unique new study launched exclusively at Parallels Summit 2013.<\/em><\/strong><em> <\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Tenfold shame<\/strong><\/p>\n<p>The paper explores ten core truths that show the weaknesses of username and password <em>so clearly<\/em>, that when I found out what they had unearthed, I frightened myself.<\/p>\n<p>Did you know, for example, that the IEEE (Institute of Electrical and Electronic Engineers) &ndash; one of the most respected organisations in the world &ndash; lost over 100,000 user logins to hackers because it was storing username and password information in a file on its website? And that the areas of the site that were compromised potentially included sensitive Western military engineering data?<\/p>\n<p>And had you considered that the speed and ease with which hackers can now access username and password files has so increased the <em>volume<\/em> of confidential user data being illegally traded online that this data now sells for next to nothing? (European credit card data, for example, will sell for around $3 per card on the internet &#8211; US and Canadian, a mere $1). Like I said, scary stuff.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Not just a consumer story<\/strong><\/p>\n<p>But it was the data on users&rsquo; real-world experience of actually <em>using<\/em> passwords that <em>really<\/em> made me wince, because its consequences aren&rsquo;t restricted to consumers or hobbyists. Rather, it&rsquo;s an issue for every single internet and cloud user, from the provisioning supplier to the individual end-user &#8211; and every party in between.<\/p>\n<p>Users <em>forget <\/em>passwords<em>. <\/em>Consider this:<\/p>\n<ul>\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 64% of end users have written down their password at least once<\/li>\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 70% of people do not use a unique password for each website<\/li>\n<\/ul>\n<p>More worryingly, users <em>routinely pick passwords that are laughably weak<\/em>, in an effort to increase their memorability. A recent security breach at Yahoo, for example, showed that thousands of users&rsquo; passwords were either &ldquo;password&rdquo;, &ldquo;welcome&rdquo;, &ldquo;123456&rdquo; or &ldquo;ninja&rdquo;!<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What gives?<\/strong><\/p>\n<p>The world is perpetuating a login method that is inherently weak, has been repeatedly compromised, is single-handedly responsible for making the thousands of dollars&rsquo; worth of credit tradable on the internet for less than the price of a packet of cigarettes &ndash; and that everybody hates and finds difficult to use anyway.<\/p>\n<p>Why? Well, read the paper first. You can download it here: <a href=\"https:\/\/certivox.com\/death-username-password\/\"><strong>https:\/\/certivox.com\/death-username-password\/<\/strong><\/a><strong><span style=\"color: black;\" lang=\"EN-GB\"> <\/span><\/strong>Then come and find me on Booth 704 and tell me.<\/p>\n<p>Because I&rsquo;m still none the wiser.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our partner theatre\/developer track<\/strong><\/p>\n<p><span style=\"color: black;\" lang=\"EN-GB\">Come and hear what we&rsquo;ve got to say here:<\/span><\/p>\n<ul>\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong>Partner Theatre<\/strong> &ndash;&nbsp; 5<sup>th<\/sup> Feb&nbsp; at 12:45 &ndash; <em>Growing Your Revenues with Single Sign-On, Multi-Factor Authentication for the Cloud and Mobile<\/em>&nbsp; &ndash; Frank Boening (CertiVox)<\/li>\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong>Developer Track<\/strong> &ndash; 6<sup>th<\/sup> Feb at 10:30 &ndash; <em>Extending APS packages with Single Sign-On <\/em>&ndash; Brian Spector and Gene Myers (CertiVox)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>by, Brian Spector, CEO, Certivox<br \/>\n&nbsp;<br \/>\nWhen my team started to work on a paper about the vulnerabilities of usernames and passwords recently, I decided we would defy typical cryptography vendor behaviour. Instead of a technical whitepaper full of arch&#8230;<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-5692","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/5692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=5692"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/5692\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=5692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=5692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=5692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}