Skip to content
Menu
menu

Passwords dangle on fish hooks in front of the head of an employee. Workers often chose poorly conceived passwords.

The Pernicious Problem of Passwords

Amidst so much turmoil and societal change during the past few years, one core feature of humanity has remained the same: people are bad at creating strong passwords.
Despite warnings and recommendations, we still use the streets we grew up on, references to our high school mascot, phrases from our favorite movies, or the same word with a different set of numbers attached to the end for every login. The issue is a rampant one, identity management and fraud detection firm SpyCloud found in an analysis of breach exposures affecting Fortune 1000 enterprises.

Read the Article

Related: Verizon 2022 DBIR Reveals Rise in Ransomware Attacks and Organized Crime Activity

Recommended: Why Zero Trust Must Extend into Deep Infrastructure

Featured Articles

Security Technology: Big Changes on Campus

While students, teachers, employees, and staff head back to campus, the facilities they're returning to and the threat environment around them have changed. The August issue of Security Technology examines these changes, steps security practitioners are taking to mitigate evolving risks, and the technology they're embracing to address campus vulnerabilities.

Security Management Podcast

GSX Daily: Using Empathetic Service to De-Escalate Scenarios

What role do empathy and “service from the heart” play in effective security missions?  These approaches enable Alex Jadrich, manager of public safety, security, and emergency management at the Denver Zoo, to connect more successfully with his team, his customers, and his guests and drive a more positive interaction with the organization. In this episode of the GSX Daily podcast, Jadrich and host Chuck Harold discuss management approaches, de-escalation, and influence.

Want to learn more? Join Jadrich at GSX 2022 for his session, Why Security Organizational Administrators Need to Lead with Service from the Heart, on Wednesday, 14 September.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms

The CISO’s Next Frontier: AI, Post-Quantum Cryptography

Featured in the September/October Issue

When it comes to computer security, the times are constantly changing. That is one of the most challenging aspects of security—by the time you finally secure something, numerous new threats have arrived.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.

Fast Facts:
Top 7 Stolen Items by Organized Retail Crime Gangs

Security Management News Feeds

;
record_voice_over

Podcasts

Hear what Security Management editors and guest speakers have to say about this month’s magazine.

cast_for_education

Webinars

View all of our past and upcoming educational webinars.

cloud_download

Download

ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.

arrow_upward