The Password Conundrum

Passwords are ubiquitous in today’s world. The only problem is that they have turned into such a major nuisance. They exist obviously to protect access to sensitive information and personal data, but passwords have also become incredibly frustrating; you shouldn’t use the same one across the board, which means you probably have variations of the same one, which means you have to remember which one is for which site, and then when you have to reset your password because inevitably you can’t remember it, then you comically get an error message that says your new password can’t be the same as your old password. Also, please don’t forget that your password now has to be complex enough that it’s hard to guess. So, add that to the list. Finally, any form of password that is based on personal information is considered verboten.

Password management tools and apps can help ease the pain of passwords, but those don’t solve many of the password challenges all of the time. They might make it easier for the user, but do little to protect data in the event of a breach, or insider attack, from keeping unauthorized users from your firms or nations data and information. Once a password is stolen, your data is in the clear.

And if passwords are that irritating to a user, they cause a whole additional set of issues for enterprises. Think about it: if the average enterprise uses 1,400 cloud applications (SkyHigh Networks estimate) and each enterprise has thousands of users accessing those applications, that’s password management for literally millions of passwords.  Complicating things further are complex IT environments, administrative and operational costs, needing to meet compliance regulations, and of course, keeping everyone within your organization up to date on your security and password policies.

From an organizational and security standpoint, some of the problems with passwords include:

  • 20-50% of all IT help desk tickets* are for password resets and U.S.-based organizations spend over $1 million annually in password-related support costs
  • They make for poor user experiences: the average business user must remember and log in with as many as 190 passwords
  • 81% of all breaches involve stolen or weak credentials, while 29% of all breaches involved the use of stolen credentials

Overall, passwords are neither the best nor the most secure gatekeeper for our most important assets, which then begs the question: why are we still using them? And yet, the jump from using passwords to another solution seems very far away. Is getting rid of passwords a realistic future? Right now, the big push is into biometrics as a means to identify users, but is it scalable for enterprises? At the moment, probably not. The market is not currently in a place to support this easily. Also, biometric identity still does not protect your data in the face of an attack. As with passwords, once a hacker is past the identity verification phase, your data can be accessed easily.

Enter the Helix22 SDK. It was designed very much with the password and identity verification as a focus.  You see, Helix22 protects the data at the source itself unlike most other data security products that try to limit access.  This means, that with our DNA BindingTM, the encryption protocol embeds directly with the data itself.  Your data is always 100% secure. Therefore, even in the case of  a breach due to password theft or error, any data that is copied, downloaded, forwarded or saved is rendered useless.

At BLAKFX, we manage data transmission through the truly brilliant and patented pending universal Helix22 key service. The genius is that the Helix22 encryption originates on your device. By the time the data arrives to our key server, it is already encrypted so all we need to do is issue another key. This key will then only work with the receiving device, which generates the matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server and even if subpoenaed, we can honor the request by just handing over the encrypted gibberish…as that is all we have.  Further, Helix22 also only use keys one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique user2user encryption (U2U) world, there is zero opportunity at all for any data breach.

Our patented encryption we have developed is mutli-layered and superbly designed. It has proven to be unhackable. We have tested with MI5 and our founders developed Wickr, which since its inception in 2012 has never been hacked and is now utilized by the US military for their communications. Helix22 has been exponentially imagined and secured over that period.

As the data world tries to solve the password conundrum, your frim or nation can just skip that as use a security product that is 100% secure.

Helix22 – Zero Risk

 

*Statistics from DuoSecuirty