Friday, 20 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Maximising data security this Change Your Password Day
Global Market

Maximising data security this Change Your Password Day

Last updated: February 4, 2024 3:01 pm
Published February 4, 2024
Share
Maximising data security this Change Your Password Day
SHARE

Experts from across the industry share their thoughts about what needs to be done to better protect organisations and what security measures need to be considered this Change Your Password Day.

Our online security has become increasingly anxiety-inducing, and the use of traditional passwords is failing to keep up with the growing number of sophisticated and complex cyber threats. Just last year, British companies experienced 2.39 million cyber-attacks; a worrying statistic which tells us it it’s time for change. Organisations must take action and fortify their security to protect their data, finances, and reputation.

Safeguarding users

There are several ways organisations can put in place to protect themselves. Firstly – strong passwords. Paul Anderson, VP UK & Ireland at Fortinet, says, “Having strong passwords is a way to prevent threats from entering networks, while regularly changing passwords to ensure data is protected demonstrates how everyone in a business has a part to play to maintain security.”

Adam Marrè, Chief Information Security Officer at Arctic Wolf, agrees that “passwords are the lifeblood of our online persona; we need to take them seriously to protect ourselves from the threat of cybercrime.” He recommends organisations have strong password management practices, including regular updates to passwords and ensuring they “don’t consist of words or phrases that can be associated directly with you, your interests or family.” He also observes that, while people should use unique passwords for every account, “we must turn on two-factor authentication if it’s available, as well as using a reputable and recognised password manager.” He adds, “With so many passwords to keep track of password discipline is difficult. The risk is, if your password is compromised, all your electronic assets are potentially open to hackers.”

See also  Bluehost Brings Enterprise-Grade AI and Cloud Power to Small Businesses

Current security practices are more risky than we think, according to Andy Thompson, Offensive Research Evangelist at CyberArk Labs. “Simply putting strong passwords in place is no longer good enough. In fact, no matter how strong your password is, if a threat actor gets a hold of a cookie, none of it matters,” he explains. “Instead, we need a mechanism that mandates users to frequently change their credentials. And, each time, this mechanism must require strong, unique passwords, not iterative Password1, Password2 changes.”

David Warburton, Director, F5 Labs reminds us that, “While multi-factor authentication is still strongly recommended wherever possible, the vast number of tricks that attackers can have at their disposal mean that it is far from the unbreakable security control it was once was.” He adds, “From a business perspective, this is when you’ll need solutions that directly disrupt attacker ROI and one that can curate and analyse network, device, and environmental telemetry signals across data centres, clouds, and architectures. By modelling threat intelligence across similar attack profiles and risk surfaces, affected organisations can autonomously deploy appropriate countermeasures with maximum effectiveness.”

Navigating a passwordless future

But what does the future of passwords look like? Ping Identity’s General Manager, EMEA, Paul Inglis suggests that “the momentum behind passwordless authentication is undeniable, and many enterprise organisations are already on this digital transformation journey.”

Frederik Mennes, Director Product Management & Business Strategy at OneSpan, adds, “Traditional authentication solutions, like passwords, are no longer effective against modern threats, and upholding the integrity of your digital identity should be a top priority. This starts with passwordless protection, which emerges as a viable alternative for securing critical systems that store sensitive data, providing defence against evolving threats by eliminating vulnerabilities associated with traditional passwords.”

See also  Cyber Security & Cloud Expo Global 2026

Speaking positively about this change, Inglis adds that passwordless authentication is “a paradigm shift to enhance security and user convenience significantly.” With Ping Identity research revealing that 59% of UK consumers would switch to a different brand or service that offered them passwordless as a means of logging in, this change will fundamentally reduce fraud and give consumers more security to freely navigate the digital world without fear of scams.

This new technology doesn’t mean the use of passwords is coming to an end imminently, but it will be a move towards enhancing security and ease for users in the long-term.

Source link

TAGGED: Change, data, Day, Maximising, password, security
Share This Article
Twitter Email Copy Link Print
Previous Article cybersecurity measures How to enhance cybersecurity measures with AI
Next Article Intro to Quantum Random Number Generators Intro to Quantum Random Number Generators
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Chinese firms bypass US export restrictions on AI chips using AWS cloud

“Sure, this can be a loophole that permits Chinese language corporations to entry restricted AI…

August 24, 2024

Scintil Photonics Secures $58M to Scale Integrated Photonics for AI

Scintil Photonics, a French deep-tech firm specializing in heterogeneous built-in photonics, has raised $58 million…

September 11, 2025

Fluent Labs Raises $8M in Funding

Fluent Labs, a Dover, DE-based blended execution community, raised $8M in funding. The spherical was…

February 20, 2025

Virtus to establish first Italian data centre

The power will probably be developed on a 71,000 sqm brownfield web site which has…

February 6, 2025

Pulsant expands debt facilities to £187m to propel UK expansion

Pulsant has efficiently accomplished a refinancing initiative and considerably expanded its debt amenities, now totalling…

October 9, 2025

You Might Also Like

Antin Infrastructure Partners completes takeover of NorthC
Global Market

Antin Infrastructure Partners completes takeover of NorthC

By saad
Cloud Computing Disaster Recovery Solutions Concept - Cloud DR - Services Companies Use for the Purpose of Backing Up Resources into a Cloud Environment - 3D Illustration
Global Market

Nile adds microsegmentation and native NAC to its secure NaaS platform

By saad
Planning delays continue to delay Tritax's Slough data centre
Global Market

Planning delays continue to delay Tritax’s Slough data centre

By saad
A photograph of a row of Ethernet cables plugged into ports, with a warning sign illuminated above one of the ports.
Global Market

Telnet vulnerability opens door to remote code execution as root

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.