When someone asks how you start a typical weekday, your answer likely includes the usual suspects, be it waking up, brewing coffee, or maybe even a quick scroll through the news. But almost inevitably, in the post-pandemic world where remote work has become commonplace, it also includes logging in to work.
Buried in this mundane act is a timeless truth we often overlook. It’s part of a modern ritual that every hybrid worker performs quietly, instinctively, like it’s muscle memory—a ritual that organizations everywhere rely on, day in and day out, to protect their business integrity.
It’s not glamorous. It’s rarely questioned. But it defines the frontline of enterprise security: It’s the password routine.
While the password routine is something that is of importance to organizations, for employees, it is simply a part of the daily grind, an afterthought tucked between calendar invites and coffee refills, driven more by habit than by a conscious understanding of its security implications.
The subtle art of choosing a password
So this is how it goes, right?
When you join an organization, you are added to their corporate network. Immediately, you are instructed to choose a password that you will use to log in to work, remotely or otherwise.
Now let’s be honest, at this particular juncture, how many of us put the security of the organization over our everyday convenience?
Yes, there are organizational policies that demand that you choose complex passwords. But let’s face it, most of us still choose the nearest mental shortcut—the very same password we’ve used for years in other places, tweaked just enough to meet the bare minimum requirements, likely written down somewhere.
Alright, let’s say we do this for organizational routines where forgetting a password is a hassle, because there are compliance policies to navigate, reset procedures to follow, and IT support to involve. In a bureaucratic work setting like that, reusing an easy-to-remember password makes a certain kind of sense. We, however, carry the same behavior into our personal lives too, where support is limited and the consequences of a breach can be far more personal, yet we often choose convenience over security.
We know password reuse is bad. So, why do we still do it?
Organizations tend to overlook this underlying behavioral pattern and instead respond by piling on layers of compliance training and rigid security protocols over already burdensome password routines. This is because they often choose to treat password misbehavior by their workforce as a knowledge problem. They assume that if employees knew better, they’d practice better password hygiene.
That’s just not it. This behaviour is due to deeply hard-coded cognitive biases that drive us towards making decisions that express our wariness towards anything that falls beyond the boundaries of the familiar.
Just enough is good enough.
The concept suggests that when people are bounded by limits such as time, information, and cognitive resources, they don’t seek to make the perfect decision, but rather choose to settle with a satisfactory one.
We aren’t trying to get security wrong. We are simply trying to get our job done. Managing passwords is mentally exhausting, so we settle for shortcuts like browser autofill or reused passwords. It is not laziness. It’s simply an efficient trade-off in our mental cost benefit calculation.
If I remember it, it must be right.
This cognitive bias suggests that people verify the integrity or truth of something based on how easily they can recall an example or piece of information to justify it. The more recent or personal it is, the more integral or secure people feel regardless of actual evidence.
We manage passwords the same way we manage memories: by leaning on what’s easiest to recall. So, we stick with variations of the same password or reuse ones from other accounts. We don’t choose these passwords because they are secure, which they aren’t, but because they are cognitively available. We equate memorability with safety, even when that makes us more vulnerable.
Loss aversion
I’d rather not lose access than make it more secure.
This cognitive principle refers to the fact that people feel the pain of loss more vividly than they feel the pleasure of potential gains.
For many users, the fear of being locked out feels more immediate than the risk of a cyberattack. This anxiety drives habits like writing passwords down, reusing passwords from personal accounts, or using system defaults. It is not that people do not understand the risks. It is that the need for uninterrupted access often outweighs the promise of long-term protection.
Expecting perfect decisions from a workforce in imperfect circumstances often proves futile. If secure behaviour feels like a burden, it means the system wasn’t built with people in mind. While security practices could be inculcated with a training video, the buck does not stop there.
Bridging the gap between the familiar and the secure
To truly support secure behaviour at scale, organizations must take the burden of password management out of employees’ hands. Organizations need to reduce the likelihood of human error and bypass the biases that lead to password fatigue, reuse, or insecure storage. The best way to prevent risky password behaviour is to remove the need for passwords altogether.
Adoption of authentication tools that allow the use of passkeys, SSO, and magic links remove the friction points where users typically falter.
Passkeys are a shift in default behaviour. Instead of forcing users to recall or manage credentials, passkeys use device-bound cryptographic keys that sync securely across devices. In places where passkeys can’t be applied, SSO can be enabled for cross-organzational access. SSO streamlines access across platforms with a single credential or authentication touchpoint. By centralizing login, users aren’t juggling dozens of entry points.
To further eliminate the biases that interfere with password management, organizations can take advantage of the use of passkey-enabled vaults that take away the need for password management by the individual. Once these systems are in place, organizations can then, with training that enables value-based engagement, show employees how these systems make security go hand-in-hand with productivity.
These upgrades bypass bounded rationality by removing the mental strain of managing access under pressure because the fewer decisions people need to make, the fewer chances they have to settle for whatever gets them through the day. And when there’s nothing to remember, the availability bias has no room to work its illusion. The choice disappears, therefore so does the risk. For users who fear getting locked out more than being breached, this is a shift that matters, because now they get security without sacrificing access.
So, when an organization adopts such controls that take away the dependency on the user’s cognitive biases, they’re not just deploying a security measure. They’re making a behavioural intervention. They’re eliminating the decision points where things go wrong, where people choose what’s easy, not what’s right.
Ensuring policy keeps pace with tech
The transition to a truly secure enterprise can’t rely on technology alone. It must also be reflected at a policy level. Traditional access sharing when it comes to privileged access to critical systems often leaves gaps. For example, in instances when there are scheduled maintenance tasks to be performed on critical domain endpoints, employees rely on shared credentials or manual approval processes, where cognitive shortcuts lead to over-permissioned accounts and stagnant access rights.
To counter this, organizations are increasingly turning to passwordless access sharing through privileged access management solutions. These solutions streamline the process by automatically granting, revoking, and auditing access based on predefined policies. PAM solutions ensure that every access is just in time and precisely scoped, removing the need for human intervention.
Yet even the best technical solutions can’t overcome a misaligned policy.
In this context, artificial intelligence steps in as a crucial enabler at the policy layer. IT administrators who are meant to supervise privileged access are also human and also go through similar cognitive biases, which would allot access based on previous instances. However, sometimes privileged users might have permissions that they have never used, which might slip under the radar, leading to standing privileges.
When artificial intelligence is introduced at this juncture to suggest dynamic privileged access policies based on real-time risk assessments and to detect anomalous behavior, it tends to these unnecessary cognitive interferences.
Recognising the absurdity in enterprise password management
In The Myth of Sisyphus, Albert Camus tells an absurd story of a man condemned to push a boulder uphill forever, only to watch it roll back down each time. Camus uses this image to explore how, even in repetitive and seemingly meaningless tasks, we search for purpose.
In many ways, our daily interactions with security protocols, be it passwords, login prompts, phishing drills, and compliance checklists, feel a lot like Sisyphus’ burden. We’re expected to stay alert, follow a growing list of rules, and keep up with our actual work. But people don’t function well under constant pressure. Over time, fatigue kicks in, habits take over, and we look for workarounds, not because we don’t care, but because it’s human nature.
The solution is not to add more complexity; it’s to rethink the system. Tools like passkeys, SSO, PAM, and AI do not just improve security. They’re philosophical corrections. They relieve the individual of this absurdity. In doing so, the boulder vanishes, and what remains is a system designed to reflect the reality of people’s thought processes and cognitive capacities.
__
Author bio
Niresh Swamy is an enterprise evangelist at ManageEngine, the enterprise IT management division of Zoho Corporation. In his current role, he explores the tech, IT, and cybersecurity landscape, unearthing disruptive news about industries and converting his research into thought leadership content. When not at work, Niresh channels his creativity into existential poetry, loses himself in speculative sci-fi novels, and devours everything cinema.
Ad