Sectona Logo
  • Platform

    Sectona Security Platform

    Sectona Security Platform Thumbnail
    Explore Platform

    Products

    Privileged Access Management Icon

    Privileged Access Management
    Manage Passwords, Secrets & Monitor Sessions

    Endpoint Privilege Management Icon

    Endpoint Privilege Management
    Control and Secure Administrators Credentials

    Privileged Access Governance Icon

    Privileged Access Governance
    Govern Privileged Entitlement

    Platform Capabilities

    Continuous Discovery Icon

    Continuous Discovery

    Password Management Icon

    Password Management

    Secure Remote Access Icon

    Secure Remote Access

    Session Recording and Threat Analytics Icon

    Session Recording and Threat Analytics

    Multi-Factor Authentication Icon

    Multi-Factor Authentication

    Just-in-time Access Icon

    Just-in-Time Access

    Privileged Task Management Icon

    Privileged Task Management

    Account Lifecycle Management Icon

    Account Lifecycle Management

  • Solutions
    Accelerating Privilege Management Thumbnail

    Accelerating Privilege Management Transformation

    Read Whitepaper
    By Use Case Icon

    BY USE-CASES

    Secure Remote Privileged access

    Remove Administrator Rights

    Secure Cloud Environments

    Automate Entitlement Reviews

    Simplify Privileged Account Lifecyle

    By Initiative Icon

    BY INITIATIVE

    PCI-DSS Compliance

    ISO 27002

    SWIFT Security Framework

    Documentation Downloads Request Demo
  • Resources
    Accelerating Privilege Management Thumbnail

    Accelerating Privilege Management Transformation

    Read Whitepaper
    Resources Icon

    RESOURCES

    Datasheets

    Solution Briefs

    Whitepapers

    Case Studies

    Guides & Toolkits

    View All Resources

    Learn Icon

    LEARN

    PAM 101

    Technology Blog

    Product Updates

    Documentation

    Explore

    Documentation
    Learn How to Implement & Manage
    Downloads
    Find Software, Plugins & Updates
    Request Demo
  • Services

    From the Blog

    Gartner Magic Quadrant

    Gartner Magic Quadrant 2021: Sectona PAM Gets a Notable Mention

    Read Whitepaper
    TRAINING & SERVICE Professional Services Get the help you need to succeed with your privileged access management project.Explore
    Training & Certification Access learning and trainings options to improve the success of Sectona platform.Explore
    Get Support Icon

    GET SUPPORT

    Email Us

    Create a Case

    Customer Success

    Download Resources

    Explore

    Documentation
    Learn How to Implement & Manage
    Downloads
    Find Software, Plugins & Updates
    Request Demo
  • Company
    COMPANY
    Company Thumbnail

    About Us

    Customers

    Events

    Contact Us

    PARTNER
    Partner Thumbnail

    Find a Partner

    Become a Partner

    Register a Deal

    CAREERS
    Career Thumbnail

    Join the Team

    Explore Career Opportunities

    Explore Fellowship Program

    Become a Partner Become a Partner
Request Demo
Sectona Logo
  • Home
  • Platform
    • Continuous Discovery
    • Password Management
    • Secure Remote Access
    • Session Recording and Threat Analytics
    • Multi-Factor Authentication
    • Just In Time Access
    • Privileged Task Management
    • Account Lifecycle Management
    • Windows Privilege Management
    • Privileged Access Governance
  • Solutions
    • Secure remote privileged access
    • Remove Administrator Rights
    • Secure Cloud Environments
    • Automate Entitlement Reviews
    • Simplify Privileged Account lifecycle
    • PCI DSS Compliance Pertaining to Privileged Access
    • ISO 27002 Standard – Best Practices for PAM
    • SWIFT Security Framework For Privileged Access
  • Resources
    • Blog
    • PAM 101
    • Resources
  • Services
    • Professional Services – Personalised Industry Based Solution
    • Training & Certifications – Gain Insight into Sectona Platform
  • Company
    • About Us
    • Contact Us
    • Branding
    • Customers
  • Partner
    • Find a Partner
    • Become a Sectona Partner
    • Register a Deal
  • Explore
    • Documentation
    • Downloads
    • Free Edition – Get Your Free Trial Today
    • Explore the Sectona Security Platform
Menu
  • Home
  • Platform
    • Continuous Discovery
    • Password Management
    • Secure Remote Access
    • Session Recording and Threat Analytics
    • Multi-Factor Authentication
    • Just In Time Access
    • Privileged Task Management
    • Account Lifecycle Management
    • Windows Privilege Management
    • Privileged Access Governance
  • Solutions
    • Secure remote privileged access
    • Remove Administrator Rights
    • Secure Cloud Environments
    • Automate Entitlement Reviews
    • Simplify Privileged Account lifecycle
    • PCI DSS Compliance Pertaining to Privileged Access
    • ISO 27002 Standard – Best Practices for PAM
    • SWIFT Security Framework For Privileged Access
  • Resources
    • Blog
    • PAM 101
    • Resources
  • Services
    • Professional Services – Personalised Industry Based Solution
    • Training & Certifications – Gain Insight into Sectona Platform
  • Company
    • About Us
    • Contact Us
    • Branding
    • Customers
  • Partner
    • Find a Partner
    • Become a Sectona Partner
    • Register a Deal
  • Explore
    • Documentation
    • Downloads
    • Free Edition – Get Your Free Trial Today
    • Explore the Sectona Security Platform
Home / Technology / Are Passwords a Weakling in the World of Authentication? 
ByPranav Nair October 16, 2017December 29, 2022

Are Passwords a Weakling in the World of Authentication? 

Are-Passwords-A-Weakling-In-The-World-Of-Authentication-Blog-Featured-Image

Password-based authentication is the most trusted and adopted method today. Organizations still adopt the policy of using passwords to gain access to critical systems and assets.  

Passwords remain the preferred favourite for one of the authentication levels when businesses enable two-factor and multi-factor authentication. They are a way of life in an IT environment. Yet, despite the repeated news of weak passwords being the cause of attacks, the practice of using risky passwords continues.  

Reports say that an average of 19% of enterprise professionals use poor-quality passwords or shared passwords that make their accounts easily vulnerable. 2016 Verizon Data Breach Investigation Report (DBIR) suggests that mediocre quality, weak and shared passwords attributed to 63% of the confirmed data breaches. But is it only the password quality that should get all the blame? 

There are many reasons for using poor password quality; for instance, the advent of Bring Your Own Device (BYOD) has added fuel to the fire. BYOD lets users access organizational resources on their own devices. Typically, when users access critical data on their personal devices, two challenges arise: 

  • Firstly, users cannot keep complex passwords because typing them on a mobile device each time makes the authentication tedious.  
  • Secondly, according to Just-in-Time practices, users can not stay logged in unless they are required to access the system to complete a specific task.  

So, the quality of passwords naturally tends to be poor owing to the convenience of typing out these passwords.  

On the other hand, today, dual-factor authentication mechanisms have become a usual affair. Generally, a few questions about this mechanism arise. These questions include, what is the compatibility of the dual-factor mechanism to be set up across all media? Can a dual-factor token used on a laptop seamlessly be used for a tablet device or mobile device? If not, then is authentication compromised? What needs to be done in such a scenario? 

Solution for Better Authentication of Passwords 

The ideal solution is to ensure a Multi-Factor Authentication (MFA) mechanism is in place if not already implemented. BYOD is an inevitable exercise in today’s times. So, enabling MFA should be such that it should provide flexibility and compatibility across devices.  

Start with following some password best practices, which is a crucial step toward robust password management. Set up passwords that are at least 8-charactered alphanumeric words – a combination of lowercase, and uppercase letters, numbers, and special characters. Also, ensuring that common Dictionary words and common passwords, such as [email protected], are not used is essential. This ensures there are, at the very least, about 100+ million combinations. 

A hacker’s toolkit would not be able to crack the combinations quickly. Neither is the hacker going to take the pain of identifying the right combination. In conjunction with this, a dual-factor mechanism should be used. As far as a dual factor is concerned, flexibility across devices for compatible authentication mechanisms should be enabled.

For instance, a dual factor token for a laptop, biometric authentication such as fingerprint scanning for mobile or, voice recognition for tablet devices etc., should be facilitated for access to the same system. This can ensure fool proof authentication and, at the same time, flexible authentication methods across devices. Hence, the better scenario would be to have common and apt authentication mechanisms across all media, i.e., laptop, mobile and tablet. 

Fool Proof Solution for Robust Authentication 

Will the above mentioned techniques be effective considering the zillions of user passwords and user authentication that need to be managed in organizations? Well, managing these might be a futile exercise and also unproductive. The most effective solution to ensure robust security while keeping productivity intact would be to install password management, single sign-on, and multi-factor authentication tools. Better still would be to deploy a Privileged Access Management (PAM) solution with all these capabilities. A PAM solution is well-rounded in automatically managing passwords and ensuring strong authentication and access mechanisms. 

How Sectona can Help? 

Sectona has built its Privileged Access Management Solution with robust privileged password management and authentication techniques to ensure strong security of user access to critical devices both on the cloud and on-premise. 

Related Reading: Password Vaulting 

Contents

  • 1 Solution for Better Authentication of Passwords 
  • 2 Fool Proof Solution for Robust Authentication 
  • 3 How Sectona can Help? 
Was this article helpful?
YesNo

Recent Posts

  • Privileged User Behaviour Analytics to Analyze Threats in Advance

    Privileged User Behaviour Analytics to Analyze Threats in Advance

    January 12, 2023
  • What is a Ransomware Attack?

    What is a Ransomware Attack?

    January 9, 2023
  • Sectona is recognized as a 2022 Gartner® Peer Insights™ Customers Choice for Privileged Access Management 

    Sectona is recognized as a 2022 Gartner® Peer Insights™ Customers Choice for Privileged Access Management 

    January 5, 2023
  • One of the world’s largest mobile operators implements Sectona PAM

    One of the world’s largest mobile operators implements Sectona PAM

    December 21, 2022
  • Year-in-Review: Looking Back at 2022

    Year-in-Review: Looking Back at 2022

    December 15, 2022

Explore


  • About
  • Careers We're Hiring
  • Contact Us
  • Security Platform
  • Partners
  • Documentation
  • Sectona Blog
  • PAM 101New
  • Branding
  • Events

Capabilities


  • Continuous Discovery
  • Password Management
  • Secure Remote Access
  • Session Recording and Threat Analytics
  • Mutli-Factor Authentication
  • Just-in-Time Access
  • Privileged Task Management
  • Account Lifecycle Management

Solutions


  • Secure Remote Privileged Access
  • Remove Administrator Rights
  • Secure Cloud Environments
  • Automate Entitlement Reviews
  • Simplify Privileged Account Lifecyle
Sectona Gartner Peer Insights Rating Sectona ISO Certification
Sectona Logo

© 2023 Sectona Technologies Private Limited. All rights reserved. All trademarks held by their respective owners.

PRIVACY POLICY | TERMS | EULA | RESPONSIBLE DISCLOSURE

Scroll to top
  • Home
  • Platform
    • Continuous Discovery
    • Password Management
    • Secure Remote Access
    • Session Recording and Threat Analytics
    • Multi-Factor Authentication
    • Just In Time Access
    • Privileged Task Management
    • Account Lifecycle Management
    • Windows Privilege Management
    • Privileged Access Governance
  • Solutions
    • Secure remote privileged access
    • Remove Administrator Rights
    • Secure Cloud Environments
    • Automate Entitlement Reviews
    • Simplify Privileged Account lifecycle
    • PCI DSS Compliance Pertaining to Privileged Access
    • ISO 27002 Standard – Best Practices for PAM
    • SWIFT Security Framework For Privileged Access
  • Resources
    • Blog
    • PAM 101
    • Resources
  • Services
    • Professional Services – Personalised Industry Based Solution
    • Training & Certifications – Gain Insight into Sectona Platform
  • Company
    • About Us
    • Contact Us
    • Branding
    • Customers
  • Partner
    • Find a Partner
    • Become a Sectona Partner
    • Register a Deal
  • Explore
    • Documentation
    • Downloads
    • Free Edition – Get Your Free Trial Today
    • Explore the Sectona Security Platform