Skip to content
Routing Number:
275082866

It’s Hard to Go Phishing with No Phish in the Pond

Brian Nowak explains how Corporate Central went passwordless to reduce end user risk.

Phishing-Blog-Graphic.jpg

Brian Nowak, Emeritus Information Technology Director
February 20224

Corporate Central has a strong focus on technology. Some of our technological initiatives are very visible and outward facing. However, there’s a lot that goes on behind the scenes that no one outside the organization ever hears about. I’d like to take this opportunity to talk about one of these changes.

IT departments have many things that keep them awake at night, security being at the top of the list. The current threat landscape doesn’t help. It’s common to hear so and so’s email was compromised, or XYZ company got hit with ransomware. It’s no secret that end users are the biggest threat to any organization. Member service teams want to help members; sales are looking forward to the next opportunity; and finance is busy making sure the numbers match. None of them have information security as their top priority.

I know that Corporate Central employees are among the best out there. However, we still run into the same challenges as other organizations when it comes to information security. One of the IT department’s goals for 2023 was to reduce the end user risk by eliminating passwords. That’s right - get rid of our staffs’ need and reliance on remembering a password, wherever possible. I would love to say that we have achieved 100% passwordless authentication, but there are some applications, processes, or systems that have just not caught up with that requirement yet. However, almost all our systems and our users no longer have a password that they know.

Our systems are designed to allow passwordless authentication via several different methods. It could be a security key, like the one used for Beastro, Windows Hello for a computer, or Microsoft Authenticator for a mobile device. Usually, any one of those options can be used for authentication into any of the systems. It really depends on the user’s preference and what the system will allow. We have been using forms of passwordless authentication for some time, but password fallback had remained an option.

I admit I was a little unsure what was going to happen when we told our staff that we were taking away their passwords. The announcement went out and it was anxiety inducing. However, most realized that they had already been using passwordless options so often that they forgot their current password. Music to my ears! After we ensured that everyone had all forms of passwordless authentication set up, we started changing everyone’s passwords to random information and didn’t document it anywhere.

A few months later, and there have been few, if any, issues. There are a few more steps to accommodate new employees, or when a user no longer has access to one of the methods they primarily use for authentication. However, the Corporate Central staff did not skip a beat.

We still phish test our users regularly. Employees are trained to not click on links in suspect emails. Nevertheless, if it does happen, we hear, “I knew right away it was not legitimate because I was being asked for my password.”

Going passwordless did not eliminate the risk that end users pose to the organization, but it could be the one change needed to prevent that negative, newsworthy event from happening. There are plenty of tools out there to facilitate going passwordless within your organization. It is certainly worthwhile making it a priority to reduce that end user risk.

Professional headshot of Will Valadez.

About the Author

Will joined Corporate Central in 2018 as an Accounting Assistant. In 2023, Will was promoted to Human Resources Business Partner. He identifies, develops, and implements proactive business and talent initiatives to assist the employer of choice objective. He also collaborates with the HR department to align the human resource function to organizational goals and objectives while overseeing and maintaining optimal function of the organization’s human resources information system (HRIS).

Read More