‘The password is fundamentally broken. How do we protect ourselves?’

2 minutes read

‘The password is fundamentally broken. How do we protect ourselves?’

Kimo Quaintance is ‘trying to get his head around of what’s happening in the social world and the political world because of the changes in the digital age’. He spoke at Mobile Convention Brussels on security in a digitizing society.

Two-factor authentication

Quaintance believes the password as we use it, is fundamentally broken. “We’ve gotten into a complexity of the number of services we use where it's impossible to really keep a secure credential set for each one and keep it in your head. 75 different password protected services. There’s no way we can keep it in our heads. Two-factor authentication for example is a really good and basic policy to secure all primary accounts”, says Mr. Quaintance.

Mobile Convention Brussels 2014 - Kimo Quaintance from Mobile Convention Brussels

Watch the interview with Kimo Quaintance, Lecturer in Cybersecurity and national security at the University of German Federal Armed Forces in Munich, and at the George C. Marshall European Center for security studies in Garmish-Partenkirchen. 

Watch the full interview here:

About CM:

Companies are always looking for the best way to reach their consumers and the rise of mobile technology offers them new opportunities to achieve this goal.

Founded in 1999, CM helps companies to interact with their customers through a multi-use mobile platform for SMS, Email and Appcare.

In addition to various messaging services, the platform also provides solutions for calling through SIP trunking, payment options for companies like Autocollect and online identification solutions such as two-factor authentication(2FA).

We offer a hybrid solution for companies to reach their target audience, anytime and anywhere.

CM Groep holds several global operating telecommunication companies specialised in corporate mobile messaging, mobile payments and ticketing.


Enjoyed this article? Please share the news!

Continue reading

Next Mobile moments are the new competitive battleground
Previous How to engage with Push Notifications and SMS Messaging?
Back To news overview

Related articles

The New Mobile Identity: more security, more privacy
Identity innovation for the future: will privacy beat service in 2018?
Misconceptions about data protection revealed: the truth about online security
'Much of IT budget spent on security, but human remains weakest link'
“Too little awareness for securing our mobile devices”

About the author

Charlotte van Raak is content marketer and makes sure our readers always have interesting blogs to read about how to engage with customers. During the day, she answers 1K questions in her role as communications advisor. At night she preferably sleeps.

Connect with Charlotte on