SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Is The Password On The Brink Of Extinction?

5 Dec 2022

Is The Password On The Brink Of Extinction?
Larry Anderson
Larry Anderson
5 Dec 2022
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Passwords face scrutiny as experts predict their decline in physical security systems.
  • Advanced authentication methods challenge password reliability for securing data and access.
  • Experts discuss potential password extinction due to improved security technology.

Editor Introduction

For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protecting access to computer systems. Nowadays, newer, more sophisticated forms of user identification and authentication have emerged on the scene. We asked this week’s Expert Panel Roundtable: Is the password on the brink of extinction in physical security? Why or why not?


Card image cap
Will Knehr i-PRO

The future is guaranteed to be password-less. Users loathe passwords almost as much as security experts. Trying to remember complex passwords causes users to often write passwords down or save them on a computer, making them even more vulnerable. Generic usernames and passwords are often used for maintenance or admin accounts, and reused passwords often end up in password lists used by hackers. Passwords represent a critical vulnerability in networks and are one of the most common attack vectors. The two most damning statistics on passwords are: 80% of hacking-related breaches are due to lost or stolen passwords, and 75% of users say that they are frustrated by trying to maintain them. Passwords will be likely replaced by some combination of zero trust authentication using context-based analysis, one-time pad plus pin codes with apps that constantly generate new keys, physical or app-based tokens in conjunction with a mobile device, and biometrics.

Card image cap
Mathieu Chevalier Genetec, Inc.

With a staggering 80% of cyber-attacks due to password breaches, the prospect of a password-less world is appealing. Imagine a life where no one would have to remember unique eight-character sequences or constantly update passwords to stay ahead of hackers and keep data secure. While tech giants such as Apple, Google, and Microsoft are already taking steps for this to become a reality, it will likely still be some time before passwords are completely extinct. In the meantime, we should rely more on multi-factor authentication and other alternatives such as certificate-based authentication and biometrics for additional layers of protection beyond a password. Furthermore, since passwords are meant to authenticate humans, not machines, they shouldn’t be the first choice to authenticate one system to another.

Card image cap
Chad Leedy Interface Systems LLC

While passwords will likely be with us for a while yet, it’s certainly not because they are loved and respected as a trusted method for authenticating humans and machines. It’s no real surprise that passwords are a principal cause of cyberattacks since, when users don’t like them, they are bound to take shortcuts, storing them insecurely or reusing and sharing them. Likewise, some installers are known to do the same, because they feel the risk is low—until one day it isn’t. Meanwhile, there are myriad better ways to authenticate humans using more trusted and secure methods, be it biometrics and/or any number of combinations involving trusted private and public keys on our mobile devices using authentication apps or physical tokens. Until we get to the eventual password-less future, multi-factor authentication should be used whenever possible. Passwords aren’t on the brink of extinction just yet, but they probably should be.


Editor Summary

If you are counting the days until the end of the password as we know it, prepare yourself for a lengthy wait. Imperfect as they are, passwords are likely to continue to be a go-to method of protecting access to computer systems for the foreseeable future. If we could just stop writing them down on Post-it notes affixed to our computers!

  • Related links
  • Genetec Access control software
  • Genetec Video Surveillance software
  • Biometric Access control software
  • ANPR Software Video Surveillance software
  • Access Control Software Access control software
  • Detection Software Video Surveillance software
  • Broadcast Messenger Access control software
  • Contact Access control software
  • Mifare Access control software
  • IP Surveillance Software Video Surveillance software
  • Carpool Anti-passback Access control software
  • Management Software Video Surveillance software
  • Central Monitoring Option Access control software
  • Recording Software Video Surveillance software
  • Centrally managed access solution Access control software
  • Combined online/offline solution Access control software
  • Surveillance Software Video Surveillance software
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • License Access control software
  • Management Systems Upgrade Access control software
  • Redundant System Software Access control software
  • Reporting Option Access control software
  • Server software for MSDE Access control software
  • Visitor Management tool Access control software
  • Related categories
  • Video Surveillance software
  • Access control software
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Enhancing Physical Access Control Using A Self-Service Model

Enhancing Physical Access Control Using A Self-Service Model

Download
Related articles
AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Join Kindoo's Partner Program For Security Dealers

Join Kindoo's Partner Program For Security Dealers

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Round table discussions
About this page

Discover why passwords face extinction, the role of biometrics in future security, and how to effectively eliminate risks.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec