During a session at Compliance Week Europe 2017 in Amsterdam today, Mark Johnson, CEO of The Risk Management Group, ran an interesting exercise to show just how easy it is to commit cyber-fraud. He produced an iPhone 7, and passed it around to members of the audience, encouraging them to get Siri to activate, and then ask it a few basic questions, such as โ€œWho am I?โ€ โ€œWho did I call last?โ€ and โ€œE-mail my wife.โ€ Just off of simple questions such as that, one could learn a few kernels of information about Mark that, once supplemented by a few adroit Google searches, soon revealed Markโ€™s full name, his phone number, his home address, a picture of his house, the name of his wife, the birth date of his daughter, and other details. All off of a few Google searches. To a dedicated fraudster, it would have taken all of five minutes to capitalize off of a lost iPhone.

Johnson then explained how passwords really work. When we use a password and submit it to a site, the site doesnโ€™t actually get the password. The password is encrypted by one of any number of commonly used encryption algorithms that turns your password into a strong of random characters. That string is called a โ€œhash.โ€ Since most people use โ€œpasswordโ€ as their password, however, you can reverse engineer hashes back into their source password and, since password data gets compromised all the time, large lists of hashes can be easily obtained onlineโ€”again through Googleโ€”thus showing that even when we think we have strong passwords, we really donโ€™t. Companies can add an additional hash to your hash (known as a โ€œsalt,โ€) but even that isnโ€™t foolproof, because those salts often can be compromised or accidentally exposed to the public. The bottom line is that passwords are essentially worthless, no matter what they are. โ€œMixlplyk1492!โ€ is basically the same as โ€œPasswordโ€ once the hash is obtained and reverse engineered.