Your Password Is Weak Against Hackers – What Can You Do?

Password, image by pixabay

This post is also available in: עברית (Hebrew)

Even in such a developed and still advancing digital world like ours, we still don’t seem to be able to ditch passwords. Undenounced to most of the population, passwords pose a much bigger security threat to the user than other more nefarious looking tools. They provide little to no protection against even common cyber security attacks. Despite a seemingly endless string of hacks, attacks, breaches, and breakdowns — 81% of hacking-related breaches are caused by password issues. 

Since passwords have become so standard it is almost impossible to get rid of them. As a result, digital experts have advised the use of MFA, or multifactor authentication. According to, most organizations and many consumers recognize the need to move beyond password-only authentication. Yet two-factor authentication (2FA) and even many MFA techniques were never designed for today’s sophisticated digital frameworks. Design, usability, and functionality are all critical. There’s a need to convince people to move beyond a basic password and adopt MFA, but it’s also critical to deploy higher grade MFA methods while moving to password less. 

The reasons for this reticence are at least partly rooted in the nature of today’s online world. For better or worse, people expect Web pages to load instantaneously, and they seek access to accounts without any latency — even when dozens of APIs and servers around the world are required for a transaction. 

Yet it’s also clear that MFA frameworks can be a big hassle. Oftentimes, it’s necessary to request a text code or pull out a phone and open an authenticator app from Google or Microsoft and type in a code. Meanwhile, physical tokens offer stellar security — but they can be difficult to set up and use.

“There are too many companies giving too little thought to how to implement more advanced MFA and password-less systems,” says Jason Casey, CTO for authentication vendor Beyond Identity. “You can’t build a security architecture without considering design and usability. As the level of friction goes up, participation goes down.”

Prepared to dive into the world of futuristic technology? Attend INNOTECH 2023, the international convention and exhibition for cyber, HLS and innovation at Expo, Tel Aviv, on March 29th-30th

Interested in sponsoring / a display booth at the 2023 INNOTECH exhibition? Click here for details!