top of page

The Password at 64: Why It’s Time to Rethink Our Digital Keys

Updated: May 1

On this World Password Day, cybersecurity experts are once again urging users to stop thinking of passwords as a sufficient line of defense—and start embracing stronger, simpler, and more resilient authentication methods.


“The humble password has been a cornerstone of how we access data and technology since 1961,” said Melissa Bischoping, Head of Security Research at Tanium. “MIT’s Compatible Time-Sharing System (CTSS) was the first to leverage modern passwords for safeguarding access to private files. In the 64 years since, passwords have evolved in length, complexity, and character requirements, but despite these advancements, they’ve also introduced layers of complexity to the user experience resulting in a more burdensome method of securing identity and file access.”


Bischoping’s reflection is a sobering reminder: even as password standards have toughened, security breaches haven’t slowed. In fact, the average user juggles 80 to 100 passwords—a staggering number no human brain is realistically equipped to manage. The solution for many has been password managers: one vault, one “super password,” to rule them all. But while this approach improves usability, it hasn’t solved the core issues of password-based security.


“On the surface, this is a major step forward in usability… but we’re still not getting it quite right when it comes to password security,” Bischoping noted.


The Password Paradox


It’s a paradox the cybersecurity industry has been grappling with for decades: the more complex the password requirements, the more likely users are to circumvent them—reusing credentials, writing them down, or defaulting to easily guessed phrases. Meanwhile, attackers grow more sophisticated, automating credential stuffing and exploiting password reuse across breached accounts.


That’s why Bischoping and other experts advocate not just stronger passwords, but layered defenses. For software providers, she urges mandatory multi-factor authentication (MFA), support for single sign-on (SSO) by default, and better user-centered design to make credential updates less painful. “Don’t make it unnecessarily difficult to update or change credentials,” she emphasized. “This will make the user more likely to stick to the outdated, weaker password.”


For users, the advice is equally clear: “Secure your primary password with additional levels of protection like robust, phishing-resistant MFA,” Bischoping said. She recommends hardware tokens like Yubikeys or passkeys over SMS-based authentication, and highlights the value of password manager features like reuse detection and breach alerts.


Beyond Passwords: A Shift in Mindset


The future, Bischoping believes, lies in passwordless authentication—a shift already gaining traction through passkeys embedded in modern operating systems, biometric verification, and FIDO-based standards. But transitioning to this future isn’t just about technology; it’s also about education, especially for less tech-savvy users.


“Using more secure alternatives, like passkeys, in modern operating systems and apps can help less-technical family and friends adopt stronger protections for their data,” she said.

She also cautions users to safeguard the linchpins of their digital identity: email accounts and SSO platforms like Google, Facebook, and AppleID. “These individual accounts can be the ‘keys to the kingdom’ for an attacker, so they warrant additional protections.”


A Future Without Passwords?


As we mark another World Password Day, it’s tempting to wonder: will this day one day disappear, made obsolete by technology that renders passwords irrelevant? For now, they remain a stubborn fixture of our digital lives. But with MFA adoption rising, passkeys expanding across platforms, and authentication innovation accelerating, that passwordless future is inching closer.


“We’ve come a long way,” Bischoping reflected. “But we still have work to do.”

Until then, the best advice is simple: secure what you can, layer your defenses, and never assume your password is enough.

bottom of page