Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Passwords aren’t enough: Why businesses need to build more comprehensive security

By Mario Dusaj
authentication-freepik
August 6, 2021

In the past, passwords were the key to accessing systems and platforms, and they held much value as a security measure for businesses. But over time, the threat landscape has evolved, and weaknesses have been discovered in standard encryption methods that have diminished the password’s value. In fact, recent research found that 73% of Americans lack confidence in the security of their passwords. 

Regardless of how consumers feel about passwords, however, there’s a more significant issue at hand. And that is the fact that passwords provide zero authentication that the user entering the password is the actual owner of that account. 

This flaw opens businesses up to increased security threats and risks. How can businesses ensure it’s the right person accessing their networks? What measures need to be taken to provide more comprehensive security solutions?

 

Taking the First Step

To start, it’s essential to consider the role passwords currently play in enterprise security. For many users, the familiarity of entering a password offers a sense of security and comfort. It’s been the status quo for years, and change is hard for many users.

Knowing this, business leaders need to focus on layering additional security measures and controls that can work in tandem with the password rather than dismissing the practice altogether. In doing so, they’re able to bolster the analog method with fully digital techniques. These measures will allow businesses to begin authenticating users on the back-end through additional controls. 

Even the government is getting on board as more awareness is being brought to the password problem. In early May, following the large-scale cyber-attacks on the Colonial Pipeline, SolarWinds, and the Exchange Server, President Biden announced in an executive order that government agencies must implement multi-factor authentication (MFA) based on risk and a Zero Trust security network. Even in the more slowly moving public sector, the need for a change is clear.

 

Introducing Identity Verification 

Over the last few years, as scams, fraud and social engineering have increased across the board, it started to become clear to everyone that passwords are weak defensive measures. As a result, many organizations began introducing authentication methods like one-time passcodes (OTP). 

However, that only served to create yet another channel for fraudsters and still failed to authenticate or verify the user. Furthermore, these methods make an additional (often irritating) step for the user, which (when possible) will be turned off for convenience. Worst case scenario, consumers abandon their shopping cart, and employees send frustrated help desk tickets (which hits productivity) because the repeated verification process is seemingly too arduous. 

Next came the emergence of physical biometrics. This all felt incredibly futuristic and cutting edge when consumers could use fingerprints and facial scans to access their smartphones, but flaws in the methodology became apparent once again. Users can face the same level of friction as with OTPs; facial recognition technology is not perfect and is limited based on having the latest, premium device.  

However, the more significant issue is that physical biometrics are intrusive and use personally identifiable information (PII), so permission is required to collect, store and process this method in many countries. This creates concerns from users who want to know how this data is being used, secured and creates a barrier to adoption. 

 

The Path Forward

As businesses look for the best technology to both protect their customers and the organization itself, a new method stands out above the rest. 

With behavioral biometrics, businesses can gather contextual information about an individual, such as how they hold their phone, the keystroke patterns to unlock their devices, and how they move their mouse. Unlike physical biometrics, which relies on facial recognition or fingerprints, behavioral biometrics passively gather data, adding no unnecessary friction to the user journey. Behavioral biometrics also can work across multiple devices and machines, so there is no need for highly specialized technology like a facial scanner or fingerprint reader. 

What’s more, behavioral biometrics provide robust security while still preserving user privacy. By using the contextual data points of a user’s behavior, the data can be obfuscated, thereby enabling the user’s identity to be authenticated without the need to know or access any PII. 

Once an organization has enough context to build a user’s digital identity, it can authenticate and authorize users against their own ‘normal’ behavior patterns. Because these behaviors are incredibly unique and difficult to mimic, businesses can move beyond a simple password to more easily identify genuine users and protect against fraud and bad actors. 

That said, change is hard for many. As part of the effort to incorporate any additional security measures, businesses will also have to educate users on what behavioral biometrics are, why they are needed, and how they will impact the user journey. Doing so will help users better understand the inherent weaknesses of the password while simultaneously familiarizing employees with the new authentication methods. 

 

The Key: Digital Identity Must Be At The Center 

Other solutions like Zero Trust or the CARTA Framework can help prevent unauthorized users from gaining access to a company’s network, but they are not a complete solution. Of course, there is a verification component, but that does not authorize users. The only way to truly protect your organization and your users is to ensure that digital identity is at the center of your security strategy, passively authenticating at crucial points in the user journey with minimal or no added hoops for users to jump through. 

The time when the password was king has long come and gone. As businesses and enterprises look to the future of security, digital identity lies at the heart of the solution. Accept no substitutes. 

KEYWORDS: authentication cyber security information security password risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mario Dusaj is a Solutions Architect at Callsign.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • password freepik

    Three reasons why passwords aren't going away any time soon

    See More
  • authentication-password-freepik1170x658.jpg

    Why passwords are on the way out, and why we need them anyways

    See More
  • two workers filling paper bags

    Why nonprofits need to be more worried about cybersecurity

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!