Password awareness critical

1 June 2019 Information Security, Security Services & Risk Management

If you knew just how valuable your identity was, would you pay more attention to securing it? A recent Kaspersky Lab study revealed that digital identity data and information holds significant value to cybercriminals – who craft ways of gaining this data without potential victims’ knowledge and exploit it on the dark Web for as little as $50. This reality raises the need to create more awareness about the importance of password protection and stronger password controls in the digital world.

Says Riaan Badenhorst; general manager of Kaspersky Lab in Africa, “While the digital world brings with it many conveniences that are enjoyed without a second thought, it also poses many risks to people. Turning a blind eye to these risks can be detrimental and lead to devastating effects – just think about a stolen identity and the impact this can have. And people often don’t realise the value of their digital identity/data to the cybercriminal world and how this is used on the dark Web – thus don’t pay enough attention to the need for strong password protection.”

While it is often common security practice to change passwords regularly to mitigate possible risk, this method alone is not always effective. The password problem is twofold; firstly, for effective protection, passwords need to be difficult to guess. Secondly, to be usable, passwords need to be easy to remember. While changing passwords regularly does have some positive impact on the first aspect here, regular changes drastically complicate the ability to remember passwords.

Continues Badenhorst, “It is human nature to not like the fact that one has to remember a variety of long, complicated passwords for various devices and online accounts. This often results in an individual creating one strong password for all accounts or using the same password and changing only one symbol or number for each device or account to make it easier to remember. The problem with this is that the passwords lack uniqueness and if compromised puts all devices and accounts at risk.”

A unique password is made up of two properties – a set of characters used and the length. The more diverse the characters and the longer the password, the stronger and better. Uniqueness, however, and considering how the digital world is evolving, can also come in the form of individual biometrics, which can provide an additional layer of security, especially for devices.

Says Pine Pienaar, MD of Afiswitch, “Incorporating biometrics into password procedures and in devices where viable, is a growing global practice as part of managing device access and control. While there will likely always be a place for text-based passwords that one would have to input, character-based biometric passwords will naturally progress in the digital realm, where we are already starting to see a significant uptake of biometrics-based features, for example, using fingerprints and facial recognition for the purpose of unlocking devices.”

“Based on the success of these use cases and the growing consumer demand for simplified mechanisms to protect their identities, personal data and password-secure their devices, we expect these solutions to become more mainstream and used as an additional line of defence in the war against cybercrime,” continues Pienaar.

While consumers may be able to look forward to a possible future reliant on biometric-based passwords, until this future comes to fruition, password awareness and safety measures must be taken to protect identities in the digital realm.

Concludes Badenhorst, “Passwords are there for a reason – they should not be viewed as a mechanic that causes frustration. Rather they aim to protect what matters to you most – your data. And with the opportunity to invest in password manager solutions, creating and remembering strong passwords doesn’t need to be a chore.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.