Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical SecurityIdentity ManagementCybersecurity News

The Plight of the Password

By Ted Ross
password-enews
July 5, 2018

Passwords provide a false sense of security for both users and the companies who demand them. The password requirement to protect the user (and ultimately sensitive company data), creates an entirely new frontier, both from a security perspective and for criminal activity.

Passwords are the simplest go-to for system security and are the weakest link in the cybersecurity chain. Criminals know passwords are often the only thing between them and massive amounts of data they can sell for a profit in the underground. Password breaches lead threat actors to a cache of information that generates anywhere from a few dollars to thousands per breach.

Some of the largest public breaches have occurred in the past few years, revealing security vulnerabilities that exposed billions of pieces of personal data users assumed were protected behind the veil of their passwords. The types, shapes and sizes of exposures vary, but most begin with an oversight or pure naiveté.

 

The Innocent Exposure

Few companies invite a breach, yet when they happen, most are surprised at how human error or simply being unaware of a vulnerability put the company at risk. These are the most common exposures, as companies struggle to stay in step with criminal hacking techniques. A few notable instances when innocent mistakes morphed into something much bigger:

Twitter

Twitter recently urged users to immediately change their passwords after they discovered a glitch that stored unencrypted passwords in an internal log. Even though it was an innocent mistake, anyone who may have had access to that log could have, in theory, exploited those passwords. Smartly, Twitter also recommended users consider changing their password on all services where they may have reused their Twitter password.

Equifax

Equifax found that an application vulnerability on their website resulted in nearly 150 million consumer passwords being exposed. While the exposure began in May, the breach wasn’t discovered until the end of July, giving criminals plenty of time to sell millions of Social Security numbers, birth dates, addresses, driver’s license numbers, credit card data and personally identifiable information.

Uber

Uber found themselves the victim of a hacking attack that impacted 57 million Uber users and 600,000 Uber drivers. Two hackers accessed Uber’s GitHub account to uncover username and password credentials that never should have been stored there in the first place. The breach may have cost Uber $20 billion in valuation during its attempt to sell a stake in the company.

 

The Weak Password

Weak passwords can be too short, too simple and/or too obvious. Hackers use different automated methods to crack passwords, including trying the most commonly used passwords and brute force attacks that attempt every possible character combination. These attacks are run at massive scale and speed, taking one account compromise to land the criminals in a treasure trove of sensitive corporate data.

Even when they are strong, many people reuse the same password across multiple accounts. If one of those accounts is hacked, criminals perform “credential stuffing” to test that password against thousands of popular websites to rapidly scale the attack for years. Though 91 percent of people know using the same password for multiple accounts is risky, 59 percent still do it. Reusing passwords and accessing apps like Dropbox and GitHub with personal emails is a challenge for most companies.

Facebook

One of the more prolific examples of how password reuse can be used against someone is with Mark Zuckerberg. In 2016, the Facebook CEO discovered his Twitter and Pinterest accounts had been hacked. Apparently, Zuckerberg used the same password for LinkedIn as he did for Twitter and Pinterest. When LinkedIn was hacked and millions of usernames and passwords sold on the dark web, LinkedIn users were encouraged to change their account password. Zuckerberg did so but neglected to change the same password for his other social media accounts.

 

The Unaware Employee

Employees introduce the most risk to an organization. They click on phishing emails, log into bogus sites, use weak passwords, access secure sites from unsecured devices and unwittingly download viruses and malware. Most employees are completely unaware of their mistakes.

Anthem

In the Anthem breach, hackers were able to implement a phishing campaign to compromise multiple C-level executive accounts. Because none of the executives used additional authentication mechanisms, hackers were able to easily access the entire data warehouse and remove more than 80 million customer records – all from only five breached accounts.

8Tracks

The social music streaming company 8Tracks was surprised to learn that an employee inadvertently leaked the passwords of 18 million user accounts. The company was able to source the breach to a GitHub repository that did not require two-factor authentication.

 

The common denominator in each of these breaches is the password. If cracked, the password is like an HOV lane for criminals, directing them to what they really want: personal, profitable information they can sell en masse. Unfortunately, many consumers and companies believe the password is protection enough. They are learning that’s a dangerous misconception, and many proposed technological solutions have their own sets of problems.

There are ways for users to fortify their accounts beyond passwords, yet few choose to do so because it slows down the login process. Password managers and two-factor authentication are substantially more secure methods but nearly 90 percent of Americans still keep track of their online passwords by either memorizing them or writing them down, and fewer than 30 percent use two-factor authentication.

Many companies encrypt passwords; however, the type of encryption matters. Even well-designed passwords can be stolen or compromised when service providers aren’t adequately securing them with the latest technology. Weaker algorithms, like unsalted md5 and sha1, are commonly used yet easily deciphered and immediately converted back into the readable passwords that fuel attacks. The Ashley Madison incident involved 36 million leaked passwords that were hashed with the bcrypt encryption type, clearly not strong enough to prevent a breach.

Companies may also attempt to track password exposures, but the process can be labor intensive, frequent false positives desensitize them to real threats, and they often miss many of the compromises. Their methods are too basic to catch the oft-shrouded techniques of the modern cybercriminal, particularly when the bad actor is internal to the company.

Unless organizations turn to automating their tracking and breach detection and strengthening their login and authentication through technologies like biometrics, they will continue to leave themselves, their employees, their customers and their data at risk.

Bottom line: Companies must fight fire with fire, and as long as passwords are the cornerstone of cybersecurity, we will continue to be vulnerable. Refortifying passwords and avoiding data breaches involves adjusting mentality and behavior as well as modernizing technology and service provider practices to stay a step ahead of the threat actors.

KEYWORDS: cyber risk management data breach password security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ted Ross is a 29-year network and security industry veteran who started his career in the U.S. Air Force and later became strategy architect at Walmart, executive technology director at TippingPoint and VP of the Office of Advanced Technology at HP. While at HP, he created a new HP Security Research team and built HP’s threat intelligence practice from the ground up. After HP, Ted led Exodus Intelligence as CEO and, in late 2016, launched account takeover (ATO) prevention company SpyCloud as CEO and co-founder.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data breach password

    The 10 worst password offenders of 2021

    See More
  • password security

    The state of enterprise password management

    See More
  • blue screen with login information

    39% of individuals use the same password for multiple accounts

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing