Information securityAlthough there are better methods for securing communications, like printed newspapers, the password simply won’t concede defeat and pass into oblivion.

Despite the fact that we have become a society of connected users, the password is still the security method of choice as our last line of defense.

Resistance to other methods of personal identity security are fueled by our culture, one in which protecting our anonymity is paramount. We would rather be anonymous than secure, which is the driving reason we cling to a fixed character password – even if that password is as insecure as “password123.”

Missed Opportunities

One method of identity protection available is called a digital cryptographic key. The digital key encrypts communications. However, due to our culture of anonymity, no one wants to use it. In fact, many people don’t employ encrypted e-mails, even in a corporate setting, because they fear an encrypted email will act as a beacon for hackers – a sign broadcasting, “This is an important communication, someone should try to infiltrate it.”

There have been countless opportunities in the past to implement transport protocols that would have encrypted all web traffic. Those methods, however, involved key-based encryptions – the encryption required certifications, which would establish identity. Developers, who understood that the majority of potential users would be too uncomfortable relinquishing online anonymity, did not pursue development.

Viable Options in a Mobile Environment

There are viable authentication systems available now, but these rely on identification. In the past, users could assert their identity through device ownership. However, increased mobility, multiple devices, and the evolution of workspaces into virtual constructs, has basically eliminated the practice of authentication through device ownership.

What it means

Although our culture makes it increasingly hard to discuss, securing communications through a system that identifies the user explicitly is a workable solution to security breaches. However, until our culture is ready to concede online anonymity, exploitations of data and information will continue as is – with security experts struggling to develop solutions as quickly as hackers create new threats.