Gemalto is now part of the Thales Group, find out more.
Skip to content
Gemalto: Security to be free
Our blogs: Conversations around digital security
Search
Back to articles
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (658)
    • Manfred Kube (113)
    • Tim Cawsey (83)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (41)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Didier Benkoel-Adechy (32)
    • Maria Barbieri (30)
    • Kristel Teyras (24)
    • Xavier Larduinat (21)
    • Haider Iqbal (21)
    • Sebastien Violette (20)
    • Frederic Martinez (20)
    • Neville Pattinson (20)
    • Sophie Bessin-Py (19)
    • John Ahlberg (19)
    • Ken Abbott (19)
    • Brittany Jedrzejewski (18)
    • Nicole Williams (14)
    • Isabelle Lodo (13)
    • Sek Leong (12)
    • Jennifer Hindle (12)
    • Axel Hansmann (10)
    • Sharon Ginga (10)
    • Cecile Eurendjian (10)
    • Christian Hartwigsson (8)
    • Kim Depussé (8)

    Latest blog posts by:

    • John AhlbergJohn Ahlberg
    • Philippe BenitezPhilippe Benitez
    • GemaltoGemalto
    • Didier Benkoel-AdechyDidier Benkoel-Adechy
    • Isabelle LodoIsabelle Lodo
    • Marta BordonadaMarta Bordonada
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Connected devices
    • Contactless
    • Convenience
    • Cybersecurity
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile wallet
    • Mobile marketing
    • Mobile
    • Mobile payment
    • Mobile payments
    • Mobile World Congress
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Password
    • Passwords
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Back to articles

Posted on 08 June 2012 by Gemalto in Enterprise Security

LinkedIn hack sheds light on inherent weakness of passwords

Last updated: 21 March 2014

Earlier this week, amidst reports that more than 6.5 million passwords may have been compromised in a hack of a LinkedIn database, I received several calls and emails from friends and family that feared the worst of their LinkedIn accounts, especially after LinkedIn’s Vicente Silveira took to the company’s blog to confirm the reports. Silveira didn’t mention numbers, but on all accounts, the breach is significant.

What struck me was how violated these people felt about their personal information being exposed.  Because LinkedIn is career-oriented, it is especially scary that those personal details – your livelihood, essentially – are at risk.  Being part of a digital security company, I knew all the right things to say to provide some comfort:

  1. Change your password immediately to something very strong
  2. If you use the compromised LinkedIn password for any other sites, change those too, and again – make it something strong
  3. Change your password frequently
  4. Never use the same password for multiple sites again

Despite knowing that this is the best advice, I can’t help but feel that it really isn’t enough. This LinkedIn hack has shown us that even strong passwords can be compromised, and rather easily, too.  All the cybercriminals had to do was turn to the larger hacker community and say “help.”

Silveira said in the LinkedIn blog post yesterday, “It is worth noting that the affected members who update their passwords and members whose passwords have not been compromised benefit from the enhanced security we just recently put in place, which includes hashing and salting of our current password databases.”

It’s good that LinkedIn is trying to up its security measures, but what this breach really brings to light for me is that anytime we are dealing with personal information on the Internet, passwords are just too weak.

What our entire Internet community, including those on LinkedIn, really needs is to go beyond simple passwords to strong, two-factor authentication – something you know (your username and password) and something you have (a security device). With this method, you need both a password and a physical token, such as a smart card or encrypted USB token, before you can be logged in. I’d also like to see a future where a third factor, “something you are,” (a biometric, for example) is added as well.  The more “factors,” the more our information is secured.

As we move into an increasingly digital era where more and more of our personal information is online, we need to take control over our own digital security. Ask the sites that house our personal information to take stronger security measures and move to strong authentication, and when it is offered, be sure to take advantage.

What did you think about the LinkedIn security breach? How did you feel knowing that your personal details may have been compromised? Was your account hacked? Let us know by using the comments section below.

 

Related posts:

Developing an Enterprise IT security policy

Posted on 18 October 2011 by Gemalto in Corporate

Security is as much about the use policies as it is about technology deployed – in fact some might argue that defining policies for network security is the most important…

Who is to blame? Europol shuts down skimming

Posted on 21 July 2011 by Gemalto in Corporate

For years, analysts and banking experts have been predicting that countries that move to EMV would likely see a decrease in card fraud; as a result, card fraud would migrate…

New FFIEC Guidelines: What They Got Right

Posted on 08 July 2011 by Gemalto in Corporate

A fortnight ago, I speculated on the next set of Federal Financial Institutions Examination Council (FFIEC) guidelines, and what they might mean for security and authentication in the online banking…

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Gemalto: a Thales company
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2023 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

    • ACTIVITIES
    • Defence & Security
    • Digital Identity and Security
    • Aerospace
    • Space
    • Ground Transportation
    • Market-specific solutions
    • GLOBAL
    • Career
    • Investor
    • Journalist
    • Customer Online
    • SOCIAL NETWORKS
    • Facebook
    • Twitter
    • LinkedIn
    • Instagram
    • Youtube
    Decisive technology for decisive moments
    www.thalesgroup.com
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy