Virtualization Technology News and Information
Article
RSS
Passwords Rendered Obsolete by New Security Technology

infOsci, LLC announced today the capability to securely send communications and access web-based services, apps and devices without the need for multiple, elaborate passwords. The company's patented Ci4 technology works by changing security keys on the fly, in the background, as often as desired-every 30 minutes, every 30 seconds, or every 0.3 seconds-so that even an attacker with the key is defeated the instant the system updates. By removing passwords from the authentication process, Ci4 presents an entirely new security paradigm that grants end users the rare combination of greater security and improved convenience.

In a recent survey of 2,000 adults, FICO, a data analytics company, uncovered the frustration many Americans feel with modern security measures. According to the survey, 64 percent of respondents don't see the need for elaborate passwords featuring a mix of numbers, symbols and capital letters. And 78 percent of respondents said they struggle to keep track of all their passwords. On average, users have 34 different online accounts.

"Because we take passwords out of the security chain and simply make them your name and address, you can use the same password everywhere and you don't have to keep it secret," said John Ellingson, managing member at infOsci. "Ci4's revolutionary approach to end-point security presents a unique way to deliver both: providing a superior level of security for devices, without the hassle of creating and remembering multiple, complex passwords."

Recent and highly publicized data breaches at Equifax, Sony, Target, the U.S. Office of Personnel Management (OPM), Yahoo! and dozens of others reveal the inadequacies of cybersecurity based upon keeping access credentials secret. A Verizon Data Breach Investigations Report2 found 80% of hacking-related breaches leverage either stolen passwords or weak or guessable passwords. Where system security is dependent upon hundreds or thousands of people maintaining secret passwords, it is only a matter of time before a password is compromised and the system becomes vulnerable.

"It is clear that cybersecurity based on secret credentials is no longer dependable security," said Caroline Lynch, owner of Copper Hills Strategies and former Chief Counsel of the House Judiciary Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. "Ci4 technology prevents breaches, phishing and spear phishing attacks, or man-in-the-middle attacks that use stolen credentials. Its ability to secure devices without the need for passwords is the next step in cybersecurity's evolution."

Ci4 technology can be readily deployed in support of cloud computing, distributed ledger technologies (including blockchains, cryptocurrencies and wallets), e-commerce, the Internet of Things (IoT), medical devices, mobile devices, streaming media, or any networked device requiring authentication to access a secure system.

Published Tuesday, July 17, 2018 9:53 AM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<July 2018>
SuMoTuWeThFrSa
24252627282930
1234567
891011121314
15161718192021
22232425262728
2930311234