Using passwords exposes your vulnerability to cybercrime.

 
Credential stuffing cyber attack

Spend any time on the web at the moment, and you are bound to see a host of articles about companies having hundreds of thousands of user accounts hacked, from Video Conferencing to Streaming providers – hackers have more time and incentive today to resell your account details than at any time in the past.

In many cases, hacked data exploits the assumption that users will re-use their passwords. Vast troves of usernames and passwords which are stolen get sold online for other hackers to perform a different type of attack called “Credential Stuffing” which, simply put, tries your most likely username and password combination on different popular streaming or service websites to see whether it is valid.

In a Data Breach Report by Verizon, it stated that 3 out of 4 of employees reuse passwords at work. Reusing passwords across business and home systems opens up the possibility for devastating hacks.

Most hacking-related breaches result from stolen or weak passwords and not from inadequate system security.

CREDENTIAL STUFFING INFOGRAPHIC.png

To try overcome this rising problem, cybersecurity experts advise users to create increasingly complicated passwords. Password policies force you to add a few %$^%#! expletives to exponentially increase the difficulty of randomly discovering your cunning, unique “Password”.

Multiple, complex passwords and the creative effort to arrive at and remember these leads to Password fatigue. Although people may choose a sophisticated password, users write down or store passwords in easily accessible places. This practice is so common it even made it into a modern Pop-Culture film, Steven Spielberg’s SciFi fantasy – ‘Ready Player One’. In this futuristic Dystopian World, the Hero was able to Hack the Villian in virtual reality, because he had seen his password written down on Post-It on his VR consol.

rp1_00000.png

The weakest link in your cybersecurity chain may more than likely be YOU.

Cybersecurity experts believe that “the password is dead”; however, trends show passwords growing to 300 Billion in 2020. Using password-based security is a weak strategy. What is the alternative?

Our solution is simple: we do not use passwords! Your device becomes the password. Our product, ‘Entry’ provides secure authentication via pre-authorised and approved devices.  Since Entry relies on device identity, the mechanism used for authentication removes security vulnerabilities inherent in traditional passwords, 2-factor authentication and one-time pin based security concepts.

Entry’s authentication platform offers customers and consumers a straightforward registration and seamless user experience. This platform further offers real-time account and device management via a mobile app. This approach protects your online identity and allows people to live safely in the digital world.

entry auth,acc,trans info graphic-01.png