Are Your Passwords Simply Hacker Keys?

The Guardian recently posted a story headlined "Cyber-attack on UK Parliament: Russia is the suspected culprit." A sustained attack on members of the UK Parliament, included Theresa May, the prime minister, and her cabinet ministers. The attack sought to gain access to accounts protected by weak passwords. Fortunately, relatively few accounts were breached. Before this attack, I imagine there was lots of grumbling about the IT security and why "123456" was not an acceptable password. "The parliamentary network has been compromised, as a result of the use of weak passwords that did not conform to guidance issued by the Parliamentary Digital Service." No one likes strong passwords. There's an inverse correlation between convenience and security. Increased security of systems, devices, and applications means less convenience for the end user. Biometrics dramatically narrows this gap by increasing system protection with a transparent, convenient solution. Biometric user verification should play a key role in your overall cyber security strategy.

The Guardian recently posted a story headlined "Cyber-attack on UK Parliament: Russia is the suspected culprit."

A sustained attack on members of the UK Parliament, included Theresa May, the prime minister, and her cabinet ministers. The attack sought to gain access to accounts protected by weak passwords.

Fortunately, relatively few accounts were breached. Before this attack, I imagine there was lots of grumbling about the IT security and why "123456" was not an acceptable password.

"The parliamentary network has been compromised, as a result of the use of weak passwords that did not conform to guidance issued by the Parliamentary Digital Service."

No one likes strong passwords.

There's an inverse correlation between convenience and security. Increased security of systems, devices, and applications means less convenience for the end user.

Biometrics dramatically narrows this gap by increasing system protection with a transparent, convenient solution.

Biometric user verification should play a key role in your overall cyber security strategy.