Behind every cyberattack is a human component.
TechRepublic's Dan Patterson met with Karl Holmqvist, Lastwall co-founder and CEO, to discuss the importance of good information design and how it can prevent your system from falling victim to a cyberattack.
Holmqvist attributes one of the biggest problems in security to weak credentials. The easiest way for a hacker to get into someone's account is not by breaking the encryption behind it, but by going after their credentials.
"It's not necessarily for somebody to break the algorithms in order to break into your accounts," he said. "What they're doing is they're taking advantage of the fact that we use a username and a password as a way to identify you." Guessing your username, he explained, is much easier than breaking the algorithm.
Looking at the Verizon data breach investigation report, it shows approximately 80% of all attacks are related to weak credentials and passwords.
This now leads to a movement to collect more data about a user's computer and their location in an attempt to get more than just two pieces of data.
"What we're doing right now in cyber would be equivalent to looking at a photo of somebody and trying to identify them based on just looking at their nose and their eyebrows," he said. "That's a very, very difficult thing to do from a recognition standpoint."
"People tend to choose notoriously bad, easy-to-remember passwords if they're not forced to do something else."
How to enable two-factor authentication on Instagram (TechRepublic)
Two-Factor Authentication (ZDNet)
Leah Brown has nothing to disclose. She does not hold investments in the technology companies she cover.
Leah Brown is the Associate Social Media Editor for TechRepublic. She manages and develops social strategies for TechRepublic and Tech Pro Research.