With password tolerance levels at an all time low, alternatives to the pesky and insecure authenticators are beginning to abound. One of those alternatives could be the Apple Watch.
Even before Apple's latest gadget began shipping last week, MicroStrategy announced it was extending its Usher enterprise security solution to the Apple Watch.
Usher, launched earlier this year, lets an enterprise use smartphones to authenticate its users and eschew user names, passwords and tokens. The solution has two parts: a back end that runs in the cloud, and an app that runs on mobile phones.
Usher on the Apple Watch allows it to act as a digital key that employees can use to log in to business systems, unlock devices, validate an identity and open entryways.
The Usher app uses all of the Apple Watch's repertoire -- glances, notifications and force touch -- to perform its functions. It is designed to detect a variety of business systems through a wireless connection as users approach.
For example, as a user walks up to a workstation, a notification will appear on the watch to unlock the hardware, which can be done with a tap of the timepiece.
Security Plus Convenience
With Usher, an enterprise can remove the need for user names, passwords, physical IDs and badges, and replace them with a software key that can reside on a smartphone or the Apple Watch.
"That can be a transformational and important application for the enterprise, because it rids it of one of the real weaknesses in enterprise security," said Paul Zolfaghari, president of MicroStrategy.
"What the watch does is give Usher one more level of convenience," he told TechNewsWorld.
Actually, the watch may be better suited for authentication than a phone.
"The watch is designed for short interactions," Zolfaghari explained. "A short but important interaction is the transaction that takes place when somebody is being granted authorization to do something."
The watch has another benefit for the overseers of enterprise security.
"If you think about enterprise security and security in general, what you find is that for something to be more secure, it has to be less convenient," Zolfaghari said.
"It's the opposite with the Apple Watch," he continued. "You get greater security with a higher level of convenience."
Bad Password Hygiene
As if any more evidence were needed about the insecurity of passwords, LogRhythm released the latest in a long line of surveys finding that users continue to ignore good password hygiene -- except in maybe one instance.
Only 19 percent of users created unique passwords for all their accounts, according to the survey of 520 full-time employees at organizations with 250 or more employees in a number of industries.
However, when it came to their personal banking accounts, 78 percent of the respondents said they used a unique password there.
Despite the apparent concern users have over their personal finances, there seems to be little change in their general attitude toward password hygiene.
"Weak and stolen credentials is still one of the most common threat vectors used by the bad guys," said Mike Reagan, chief marketing officer at LogRhythm.
In addition to finding 81 percent of participants reused passwords in one way or another, the survey found that 79 percent of the respondents changed their passwords less frequently than once per month.
"The reality is that credentials are going to be stolen. The question is, what is the value of a credential to a bad actor?" Reagan said.
"The value of a stolen password drops precipitously when a person frequently changes passwords," he continued. "If I'm changing my password every 15 days, I'm really limiting the value of my stolen credentials."
Appthority waved a red flag last week over a what it sees as a growing problem in the mobilesphere: zombie apps.
Zombie apps are created when a program is removed from an app store but remains on a person's device. Apps can be removed for any number of reasons -- a developer pulls it because he doesn't want to support it anymore, or the operators of the store toss it for violating their terms and conditions.
"When it's removed from an app store and not from the devices, it's the equivalent of announcing a product recall and not recalling the product," said Domingo Guerra, president and cofounder of Appthority.
"It's like saying, 'We can't sell this car anymore because it's not safe,' but not telling the people who are driving the car," he told TechNewsWorld.
Because zombie apps are no longer supported by a developer, any flaws found in them by bad actors can be exploited without fear of being corrected. That can make them dangerous to a user -- even more so than mobile malware.
"We looked at over 500,000 apps on enterprise devices," Guerra said.
"Less than half a percent contained malware. More than 5 percent of iOS devices, and almost 4 percent of Android devices were dead apps," he noted.
"We also found that every single enterprise has dead apps," added Guerra. "That's not true of malware."
There would be a major corporate data breach this year that leverages a mobile device, Guerra predicted.
"We're starting to see mobile devices replacing laptops and desktops in the enterprise. The [attack] surface vector is increasing tremendously because of that," he explained. "We also seeing more and more work being done on mobile devices, so the value of the data on them is increasing."
April 21. A group of small banks and credit unions request injunction against completion of US$19 million settlement announced March 19 between Target and Master Card. Group claims settlement is designed to undermine its claims against the retailer for data breach that placed at risk personal and payment card information of 103 million customers.
April 21. Senate Majority Leader Mitch McConnell introduces bill to reauthorize Section 215 of the Patriot Act through 2020 without ending blanket surveillance of Americans by U.S. intelligence agencies.
April 22. H.R. 1560, the Protecting Cyber Networks Act, passes the U.S. House of Representatives on vote of 307-116.
April 23. H.R. 1731, the National Cybersecurity Protection Advancement Act, passes U.S. House on vote of 355-63.
April 23. Adobe grants extension to the end of May to finalize a settlement of consolidated class lawsuits resulting from data breach that compromised some 3 million payment card records.
April 23. Gen. David Petraeus sentenced to two years probation and a $100,000 fine for illegally disclosing classified information to his mistress, including code-word information, detailed discussions with the president, and the names of covert operatives.
April 24. Seton Family of Hospitals in Texas informs some 39,000 patients that their personal information may be at risk following data breach discovered by the organization Feb. 26.
April 24. Congressional Budget Office estimates cost of implementing the Data Breach and Notification Act passed by Congress April 22 will be $1 million. Those costs, however, will be offset by $9 million in revenue from collection of fines imposed by the proposed law.
Follow Gadget INN' News | Reviews on Twitter: http://twitter.com/gadgetinn