Whether you love them or hate them, passwords serve an important purpose in the realm of cybersecurity. They are the first line of defense against potential threats, yet they are also notoriously easy to crack. Some of the biggest names in technology have been working on ways to get around the challenges presented by password security, including one that we are excited to highlight in today’s blog.
A potential replacement for the password is on the rise, and many individuals in the technology sector believe that it could bring about a whole new way of approaching cybersecurity: the passkey. Passkeys are stored credentials, like passwords, but instead of being stored in your brain or in a password manager, it is stored on a device, being retrieved automatically when the user needs to log into a system.
Most security attacks are launched at users to obtain their passwords, but if the users don’t know their passwords, they can’t give them to hackers. This technology works by using Bluetooth technology, with the key being generated over the connection to a user’s smartphone. The phone then signs the user into the system, cutting out any need for a user-generated authentication measure.
For passkeys to be seen as a viable alternative to current methods of authentication, they must be supported across multiple different platforms and systems. This means that they would have to become the new standard for every website, browser, password manager, and so on, which is a daunting task, to say the least. Users would also need their devices on them at all times to use their accounts, making the passkey somewhat inconvenient for access.
Even big names like Google, Apple, and Microsoft are interested in the passkey as a concept. In fact, Google has already launched a beta passkey platform to use with their Chrome browser and Android Mobile OS. The beta is available through Google Play Services, and the plan is to eventually use Google’s Password Manager to provide the necessary passkeys, using biometrics to provide access and authentication.
With the security landscape changing so radically all too often, you can never count yourself too secure to fall victim to a cybersecurity attack. To get your business’ network audited and protected, reach out to SMART Services at 586 258-0650 .
About the author
Jerry Fetty is the CEO and founder of SMART I.T. Services, Inc. Jerry has been called the "Geek King". He has been helping companies make smart decisions about their networks and automation systems for over 30 years.
Comments