No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Why Passwords Still Matter for FinServ Compliance

As cybersecurity rules intensify, firms may overlook a simple solution

by Darren James
August 7, 2023
in Cybersecurity, Financial Services
little man on padlock

Multi-factor authentication. Biometrics. Cybersecurity training. Organizations do a lot to keep their employees from falling victim to a cyber attack. And in the financial services sector, a breach of consumer data can trigger major penalties. But what if the solution is hiding in plain sight? Darren James has one word for you — passwords.

After the 2020 SolarWinds hack, the Biden Administration took significant steps to increase cybersecurity regulation across industries in the U.S. — and the finance sector was no exception. In 2021, the FTC updated its GLBA Safeguards Rule to require FTC-regulated financial institutions to develop comprehensive cybersecurity strategies and comply with industry regulation to protect consumer data. At the end of 2022, these regulations were tightened to further protect customers within the sector. But with so much change, where should organizations start? 

The answer is simple and oft-overlooked: passwords.

Cybersecurity regulations across the finance sector are ramping up

The FTC’s GLBA Safeguard Rule requires financial institutions to safeguard sensitive customer data and provide adequate privacy. This extends to financial institutions that offer adjacent products and services, like insurance or loans. Under the regulations, an institution is required to have an “adequate system of internal controls that provides reasonable assurance that the institution will achieve its objectives regarding reporting, operations and compliance.” 

This not only affects the organization itself but also means it must seriously vet the software it uses, existing systems and any third-party partners and providers to make sure that they, too, are compliant. As a result, the effects of this rule can also be felt across industries. General systems that financial institutions rely on are often used across various sectors — Microsoft Office365, for example. These systems will also need to adhere to these rules, making software safer for everyone. These rules also extend to password-based systems like password managers. 

Taking a password-focused approach

Despite efforts to move to a “passwordless” world, the reality is that passwords are not going anywhere. They’re a universal system and, crucially, a concept that everyone understands. However, end users often suffer from password fatigue and, as a result, rely on inadequate passwords. Consequently, passwords are often the weakest link in an organization’s security posture. But what does an inadequate password look like? 

We’re all, perhaps, guilty of using bad passwords. The most common password mistakes include using the same password across multiple websites/accounts, taking a pattern-based approach (for example, Companyname1!) or ignoring complexity rules altogether. The 2023 Specops Weak Password Report found that the most common base term used to attack networks across multiple ports was, staggeringly, password and more than 88% of passwords used in attacks were 12 characters or less. 

Fortunately, for organizations, a strong password policy is an easy and affordable place to start with cybersecurity compliance. A strong password policy could include adding complexity requirements, having tools that check for breached passwords or adding multi-factor authentication steps. It’s a quick fix that can be aided by tools that can be deployed quickly, removing burden from IT teams. Building a strong and comprehensive password-focused mentality that can be instilled in everyone, from end users to employees, is key. It can make end users feel empowered too, given that it’s non-invasive.

Passwordless security is a wonderful goal, but it will take years before we get to a stage where this is possible for every organization or system to implement. Yes, passwords are often the weakest link, but they are also among the lowest-hanging fruit in implementing better security policies.

cybersecurity tabletop exercises
Cybersecurity

Game-On: Why Tabletop Exercises Are Key to Cybersecurity Resilience

by Meghan Stoppel and Hannah Cornett
August 2, 2023

Tabletop exercises testing an organization’s cybersecurity plan can help reveal weaknesses. And they’re also prized by state authorities investigating breaches. Cozen O’Connor attorneys Meghan Stoppel and Hannah Cornett talk about the importance of interactive simulations and share best practices that could help firms avoid harsh penalties.

Read moreDetails

How can organizations tighten password security?

Organizations often think making users choose complicated and long passwords is the answer, which does hypothetically strengthen defenses, if measured virtually. However, this only encourages people to write passwords down to remember them. Similarly, text-based MFA can often fall short of strong security, as it’s, arguably, a virtual Post-It note. If you step away from your desk with your notifications open, anyone can access it.

So, how can we bridge the gap between passwords and passwordless systems? The answer is passphrases. Encouraging teams to think about passwords that are made up of three random words is a good place to start. Passphrases should consist of three random words that mean something to you and nothing to anyone else. You can further strengthen security by deliberately misspelling words or adding random special characters. If done correctly, users can keep these passphrases forever or only change them if they are ever found in a breach.

Another strategy is adopting a mindset that assumes a security breach will certainly happen and the only way to mitigate damage is by relying on security-first behavior. That means always getting the basics right — applying updates, testing backups, having a contingency plan, avoiding patterns and being security aware.

Bottom line for compliance 

Organizations can keep up with compliance by implementing some form of MFA. When it comes to password-based security, there are three important factors that must be considered: a knowledge factor (something that is known to the password holder), a possession factor (like a hardware token) and biometrics (like face ID). The most secure security systems will employ at least two of these things, as each other these systems are not necessarily perfect on their own.


Tags: Cyber RiskCybercrime
Previous Post

Consilio to Acquire Lawyers on Demand and SYKE

Next Post

FinServ Layoffs Increase Risk of Payment Fraud

Darren James

Darren James

Darren James is the senior product manager at Specops Software, an Outpost24 company. Darren is a seasoned cybersecurity professional with more than 20 years of experience in the IT industry. He has worked as a consultant across various organizations and sectors, including central and local governments, retail and energy. His areas of specialization include identity and access management, Active Directory and Azure AD. Darren has been with Specops Software for more than 12 years and brings his expertise to the support and development of world-class password security and authentication solutions.

Related Posts

turkish national flags

Inside Turkey’s New Cybersecurity Regulation

by Yavuz Akbulak
August 11, 2025

Some violations punishable by fines and jail time

chain link fence framework concept

Why NIST & SOC 2 Still Matter, Even as Oversight Changes

by Subho Halder
August 11, 2025

Frameworks arose from decades of real-world lessons

news roundup new

Boards Increasingly Tout AI Expertise

by Staff and Wire Reports
August 1, 2025

CCI staff share recent surveys, reports and analysis on risk, compliance, governance, infosec and leadership issues. Share details of your...

news roundup data grungy

Most Organizations Adopting AI Without Strategy as Risks Mount

by Staff and Wire Reports
July 11, 2025

Leading firms leverage AI across governance functions; privacy deletion requests surge 82%; employees struggle with AI-powered threats; payment system attacks...

Next Post
payment fraud credit cards

FinServ Layoffs Increase Risk of Payment Fraud

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights