{"id":55180,"date":"2023-10-20T16:30:17","date_gmt":"2023-10-20T16:30:17","guid":{"rendered":"http:\/\/startupsmart.test\/2023\/10\/20\/security-vs-usability-thats-the-choice-we-make-with-passwords-startupsmart\/"},"modified":"2023-10-20T16:30:17","modified_gmt":"2023-10-20T16:30:17","slug":"security-vs-usability-thats-the-choice-we-make-with-passwords-startupsmart","status":"publish","type":"post","link":"https:\/\/www.startupsmart.com.au\/uncategorized\/security-vs-usability-thats-the-choice-we-make-with-passwords-startupsmart\/","title":{"rendered":"Security vs usability: that’s the choice we make with passwords – StartupSmart"},"content":{"rendered":"
\"\"<\/div>\n

 <\/em><\/span> <\/p>\n

We all need some kind of authentication process if we are to access information systems at work or at home. We know why we need to do it: to make sure we have access to our data and unauthorised people don\u2019t.<\/p>\n

\u00a0<\/p>\n

So why do we routinely ignore such advice, particularly given the constant advice from cyber security professionals<\/a> about the need for strong passwords<\/a> that are changed frequently? It seems there is a significant disparity about what we do and what we want: is it security or is it usability?<\/p>\n

\u00a0<\/p>\n

Most authentication we encounter today is typically implemented in one (or more) of three ways:<\/p>\n