Passwords – Cybersecurity’s Favourite Hot Topic

by | Oct 19, 2022 | Thought leadership

During Cybersecurity Awareness Month, we’re once again reminded about the importance of using strong passwords and password managers as the first line of defence against cybercriminals.

As one of security’s most discussed topics, the risks have been back in the headlines recently with news that thermal imaging cameras and AI can be used to identify the heat signatures people leave behind when typing in passwords on screens and keyboards.

Researchers at the University of Glasgow found their technology could accurately reveal passwords for up to a minute after they had been entered. The concern is that techniques like these will be employed by cybercriminals to circumvent this most widely used form of security.

Focus on cyber hygiene

Password theft is, of course, nothing new with the earliest documented case appearing over 50 years ago. Today, strong password strategies have also become a core element of effective cyber hygiene, or in other words, those tasks we should all be regularly carrying out to make sure our devices, networks and data remain healthy and secure.

Many organizations also see cyber hygiene as an issue that mainly applies to their employees, how they approach cybersecurity and the risks they inevitably bring. As a result, they put too much emphasis on tactics like ‘box ticking’ cybersecurity training, assuming it’s the best way to minimize the chances of a successful attack.

While there is always a place for promoting some level of cyber hygiene, attackers increasingly rely on predictable human behaviour to tip the odds of success in their favour. Instead, organizations need to remove threats from the equation before the decision to make an unwise choice is presented to the user and they fall victim to a phishing attack, for example.

The same arguments apply to the dangers posed by file-based security threats and vulnerabilities, with users inadvertently trusting that files are seemingly safe and secure, only to activate malware after opening a file that might look completely genuine.

With these file-based cybersecurity threats increasing faster than ever, traditional reactive detection-based security solutions – such as antivirus and sandboxing – can’t keep up. Eliminating these threats lies at the core of Glasswall’s zero-trust CDR (Content Disarm and Reconstruction) solutions. Our approach proactively and instantaneously rebuilds files to their “known good” security standard, so customers benefit from safe, clean files that have been rebuilt to the manufacturer’s published specification, removing any places for malware to hide.

To learn more about Glasswall zero-trust CDR, click here.


What are file-based threats?

What is zero-trust file protection?

How does Glasswall CDR work?

Picture of a knight mask with swords to illustrate our battle for being the market leader in CDR

Glasswall vs Competitors

Why Glasswall CDR?

Learn about the simple way to protect against sophisticated file-based threats.

All resources



Case Studies

Use Cases




Product help



Contact us


strategic alliances

About our Partner Program

Our Partners

Become a Partner

Glasswall partner program

Bringing File-based threat protection to your customers

Offer a richer security portfolio with the most agile CDR platform on the market. Stand out from the competition with a partner program built for you. Let’s make files safer together.

About Glasswall

Our People




Contact Us

support lines


Raising the bar on file security

We believe people should be free to open their files without fear. To click on anything without risk of catastrophe. To use systems the way they were meant to be used. That’s why we’re raising the bar on file security at Glasswall.