PAGE HEADING

Are Secure Passwords Still a Thing?

by By Susan Firriolo, CPA, CISA, Pet Rescue 990 Project - July 20, 2023
Security

Most cybercrimes occur because of stolen passwords. Traditionally, passwords have been the go-to security method and first line of defense for protecting systems. Phishing attacks (links in emails or texts) are the top technique used by hackers to get passwords.

Are traditional password policies — creating strong passwords, installing password managers or using two-factor authentication — still protecting data? If not, what are the alternatives?

Traditional Methods

  • Strong passwords. These are long and complex passwords containing a combination of upper and lowercase letters, numbers and special characters. Common guidance includes avoiding using dictionary words, not sharing the password and changing it every 30 days. However, using strong passwords alone is risky. Hackers use techniques such as phishing, algorithms or brute force attacks to figure out passwords.
  • Password managers. Password managers have been considered a secure way to generate, store and manage complex passwords using encryption. Users only needed to remember one master password to access all their accounts. But like any password, master passwords are subject to hacking. When a master password is compromised, a hacker can change it, access all accounts and lock out the user in one attack. Password managers also take time to set up because the user has to enter usernames and passwords for all their accounts.

Enhanced Protection

There are methods that can be used in combination with passwords to enhance protection. Multi-factor authentication, single sign-on and adaptive authentication are important components in a security program. Here’s how they work:

  • Multi-factor authentication (MFA). Simple MFA usually requires users to provide a password and an authentication code sent as an email or text to verify the user. MFA offers more security than using passwords alone. However, MFA faces challenges and has been hacked using a compromised email account, sim swaps and a practice called MFA fatigue.
  • Single sign-on (SSO). This is an identity service allowing users to log in to multiple applications using a single set of credentials. SSO is also used with social media such as when an applica­tion asks you to sign in with Google or Facebook. Although SSO increases speed moving between applications, it does have risks: the user network is dependent on the SSO service provider, and if the service provider goes down, so do all user-connected network resources.
  • Adaptive authentication. This is a complex form of MFA. It evaluates user risk and chooses how to validate their identity by geo-location, device status, user behavior or other metrics. For example, logging on with a trusted device is considered a low risk so the user will be authenticated without further verifi­cation whereas it would be suspicious if a user who typically logs on at the office logs on at home. Then another type of authentication would be required to verify the user. Additionally, advanced adaptive authorization factors can con­tinuously be checked during the log-on period, such as requiring a USB device to be plugged into the user’s machine. Adaptive authorization systems are multifaceted and take time to implement. Systems with strong authentication have a tendency to lock users out of applications but systems with weak authorization can give everyone access including hackers.

Passwordless Systems

Passwordless systems, such as biometrics and hardware tokens, may or may not offer users easier access.

  • Biometrics. Biometric authentication involves using physical characteristics, such as fingerprints, facial recognition or other biometrics, to verify a user. Although biometrics cannot be replicated, the systems are expensive, have privacy concerns, can generate false positives and sometimes just do not work.
  • Hardware tokens. Hardware tokens are physical devices (such as key fobs or smart cards) that generate one-time codes to authenticate the user. Without the device, access is denied. If the device is lost, users cannot access the system until a new device is procured. If the device is stolen, all bets are off.

Depending on the size, structure, risk tolerance and other characteristics of an organization, CPAs may want to consider securing passwords by adding another level of protection. Passwordless security is on the way and should also be evaluated.

Icon_MemberBenefits_MID
CPACharge
CPACharge was developed specifically for CPAs, enrolled agents and accountants, providing a simple, affordable online payment solution that allows you to securely accept credit, debit, and eCheck/ACH payments from anywhere. 
NJCPA_Icn_4C
On-Site Training

NJCPA on-site training programs offer the same outstanding content and expert instruction as our seminars but are led at your location.

Icon_MemberBenefits_MID
Accounting Today
Save 20 percent on an Accounting Today subscription and stay up to date on the latest issues affecting the profession.
Icon_3_people_circle_SKY-04
Join the Accounting Educators Community

Connect and share with other accounting educators about curriculum, trends and the profession. Learn about NJCPA initiatives that are valuable for your students including information on obtaining the CPA designation, student membership, scholarships, volunteer opportunities and events.

Icon_4_cube_connection_SKY-04
Earn an AICPA Robotic Process Automation Certificate
Recognize what RPA is and its business value, with specific focus on accounting and finance functions. Understand how RPA provides a significant competitive advantage.
Icon_MemberBenefits_MID
Guaranteed Rate/Marc Demetriou
Marc Demetriou of Guaranteed Rate is offering NJCPA members a “no lender fee mortgage” ($1,440 lender fee credit), competitive low rates and a dedicated team to deliver world class service.
Icon_3_people_circle_SKY-04
Join the Women's Leadership Forum

Join our online forum that enables female CPAs at all career levels and industries to make meaningful connections with each other and discuss career goals.

Icon_Monitor_magnify_SKY-04
Earn an AICPA Single Audit Certificate
Learn how to plan, perform and evaluate single audits in accordance with the latest requirements of the new Uniform Guidance.
Icon_MemberBenefits_MID
Wolters Kluwer
NJCPA members save 25 percent on CCH CPELink subscriptions, live webinars and on-demand self-study (mobile friendly) CPE courses.
Icon_MemberBenefits_MID
SMI

SMI has negotiated special discounts for the NJCPA members with all the major technology carriers and providers.

Icon_3_people_circle_SKY-04
Join the Business & Industry Professionals Interest Group

Stay connected to your peers and share knowledge on corporate finance topics.

Wolters Kluwer CCH
Save on COVID Tax Resources
NJCPA members save 25 percent on Wolters Kluwer's new book, COVID and Taxpayer Certainty Acts of 2020: Law, Explanation & Analysis.
NJCPA_Icn_4C
Shop the NJCPA store
Are you NJCPA proud? Purchase NJCPA merch to show your pride and help support our scholarship program.
Icon_Shooting_up_arrows_MID-03
Real Estate Classified Ads
View classified ad postings for office space for sale or rent.
Icon_Handshake_MID-03
Mergers & Acquisitions Classified Ads
View classified ad postings from CPA firms looking to be acquired and those looking to acquire or merge with other firms.
Icons_3_gears_midnight-03
Professional Services Classified Ads
View classified ad postings from companies providing services to CPAs.
Icon_3_people_circle_SKY-04
Join the Cannabis Interest Group
New Jerseyans have voted to legalize cannabis. Join the NJCPA's Cannabis Interest Group to gain information, insights and best practices for serving clients in this promising new industry.
NJCPA_Icn_4C
Zoom Backgrounds
Download our virtual backgrounds for Zoom meetings.
Icon_certificate_SKY-04
Earn an AICPA Certificate
When you’re ready to show your competencies, expand your career opportunities or enter new areas of practice, start by earning an AICPA certificate. Choose a certificate that matches your next career goal.
Icon_4_cube_connection_SKY-04
Earn the AICPA Blockchain Fundamentals Certificate
Build a foundation toward becoming a strategic business partner within your organization and with your clients. Learn how to anticipate potential benefits and risks of the technology, structure and functionality, and to translate them into relevant business application and value.