No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

Passwords: A 2,400-Year History of Unreliability

Security Finally Evolves as the User Becomes the Password

by David Harding
August 2, 2019
in Data Privacy, Featured
screen scanning finger for print

With over 80 percent of data breaches resulting from compromised passwords, biometric authentication systems emerge as a solution to avoid multimillion-dollar losses, hefty fines and burdensome management of multiple complex passwords. ImageWare’s David Harding discusses.

Passwords don’t work anymore; in fact, they never have. The first record of a password being used was in 413 BC. The Greek army used memorized secrets for identity confirmation and access to private information; however, this initiative failed. The compromised passwords were one of the reasons the Greeks were slaughtered at the Battle of Syracuse. Over 2,000 years later, humankind still uses the same flawed technique to protect themselves.

The biggest misconception with data security is the notion of how hacks happen. We have a Hollywood-driven idea that hackers are extremely computer-savvy individuals in dark rooms using state-of-the-art technology to access information by penetrating through firewalls and other cybersecurity defenses. The actual process is much simpler: All an attacker needs to do is compromise a password. It could be anything from a sticky note with the password written down, a data breach at another company exposing previously used login credentials, passwords being shared by multiple users, and so on.

According to the 2017 Verizon Data Breach Investigation Report, over 81 percent of data breaches resulted from stolen or compromised passwords. So, why hasn’t this ancient practice evolved to a more secure, unbreachable method? Well, now it has.

Biometric identity authentication is the evolution away from passwords. The process relies on analyzing unique biometric data to identify and authenticate the user. This solution is far superior to passwords, as the user does not need to remember or protect a unique set of characters and numbers; the user is the password.

Companies are embracing biometric authentication systems for two main reasons:

Security

As stated previously, over 80 percent of breaches happen due to a compromised password, and these breaches are expensive. In 2018, the average cost for an organization that has suffered a data breach was $7.91 million. The loss column is not filled only with dollar signs; high-level jobs have been lost as well. Some noteworthy examples are former Target CEO, Gregg Steinhafel; former Sony Pictures CEO, Amy Pascal; and former Utah Department of Technology Services CIO, Stephen Fletcher – all were forced to resign after their systems were hacked. As illustrated, data breaches have evolved from being an IT problem to an executive boardroom discussion.

Convenience

The requirements for passwords have increased in an attempt to strengthen them. However, it is impossible to remember dozens of complex passwords that require upper- and lower-case characters, numbers, symbols, inspiring messages and hieroglyphs. Biometrics simplify this process tremendously by using a person’s very own traits as their password. Additionally, biometrics might be a corporations’ helping hand against strict legislation.

In the United States, very little legislation regulating cybersecurity and data breaches exist in comparison to Europe. GDPR’s new set of rules puts the burden of data and privacy protection on the companies collecting the data. Big companies are already being sued and potentially fined. Most recent cases include Marriott and British Airways, with potential fines of $123 million and $230 million respectively. In both cases, the penalties are due to poor handling of customers’ data.

In the U.S., the most notorious case has been Equifax’s data breach, which exposed extremely sensitive information of over 15 million people, including knowledge-based authentication questions (such as what street you grew up on or the name of your kindergarten teacher). One of the defenses hackers went through to complete this breach was, not surprisingly, an easy-to-guess password. Equifax’s data breach illustrates why biometrics have not been implemented more widely: Companies think they will never be the next victim. It is like texting and driving: we know the risks and hear of fatal crashes, but some still choose to do it. Since the pain has not been felt directly, the consequences seem foreign.

The additional expense of a biometric authentication system, coupled with the perceived complexity of deploying such a solution (many solutions are turnkey and implemented in a matter of minutes), might feel like too big of an investment since most companies believe breaches will never happen to them. However, with 49 percent of businesses suffering data breaches in 2016 and the potential of GDPR’s hefty fines, biometrics is moving from a nice-to-have system to an essential security pillar of every company.


Tags: Data Breach
Previous Post

GDPR Turns 1: Where We’ve Been and Where We’re Going

Next Post

“Everybody Wants To Do The Right Thing.” Really?

David Harding

David Harding

David Harding is CTO at ImageWare Systems. An accomplished, international executive with more than 25 years of technology implementation and management experience, David is responsible for strategic design, technology infrastructure and core strategy from concept through delivery. Before joining ImageWare Systems in 2006, David held several CTO positions, with the most recent at IC Solutions, Inc., where he was responsible for all technology departments, including the management of software development, IT and quality assurance as well as their respective hardware, software and human budgets. He has also held CTO and executive management positions at several technology companies, such as Thirsty.com, Fulcrum Point Technologies, Inc., ProSoft and Access360, which is now part of IBM/Tivoli.

Related Posts

new york and us flags

New York Tightens the Breach Clock: 30 Days to Notify

by Melissa Crespo and Reiley Porter
May 12, 2025

State joins growing national trend toward broader personal information definitions and stricter notification timelines for data compromises

group looking at data breach details digital art collage

Navigating Data Breach Compliance & Communication

by Salim Gheewalla
October 28, 2024

Compliant response starts well before an incident occurs

sec building

News Roundup: SEC Finalizes New Cybersecurity Rules for Broker-Dealers, Others

by Staff and Wire Reports
May 16, 2024

OFAC launches public-facing sanctions database

characters breaking into padlock

Navigating Personal Liability: Post–Data Breach Recommendations for Officers

by Daniel B. Garrie and Richard A. Kramer
April 16, 2024

Executives may be on the hook if info is compromised

Next Post
stick figures with apple heads, one rotten apple

"Everybody Wants To Do The Right Thing." Really?

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights