February 20, 2018

Are Passwords a Thing of the Past?

We are all too familiar with the necessity to have long and strong passwords.  Passwords protect everything we do, off and online.  However, Microsoft sees a future without passwords.

For some time, Microsoft has turned the focus away from using a password to log into your computer via PIN codes, fingerprint sensors (if you have the hardware) and facial recognition.  In an upcoming build of a stripped down version of Windows 10, called Windows 10 S, Microsoft is using its Authenticator App for Android and iOS.  This app produces an 8-digit code every minute that is unique to your phone.  This means that if your computer were stolen or someone tried to access it while you were away, they couldn’t simply to just guess your password but would require your phone as well.

But why tie our access to a smartphone and not focus on facial recognition or fingerprint scanners?  To put it simply, they really don’t measure up.  Facial recognition can be thwarted by identical twins or even by people who have similar facial structures.  Fingerprint scanners can fail repeatedly causing frustration.  Both issues have been a problem that has plagued iPhone users.  To implement this technology in a business setting can be quite costly and troublesome, especially for non-tech companies.  In America, 77% of the adults have a smartphone and companies like Google and LastPass have Authenticator software freely available that can be used.  (http://www.pewinternet.org/fact-sheet/mobile/)

The biggest issue that companies face is implementing these changes.  Changing the habits of people who, throughout their entire lives, use a username and password is a challenge to change.

“We’re putting all the focus on technology and not thinking about explaining to people,” said William Beer, a principal at business management consultancy EY. “I would suggest that while technology is great, it needs to be accompanied by a significant awareness campaign to explain and support users as they go through these changes.” – Los Angeles Times

Now we circle back to BYOD attacks – do your employees use their own cell phones for two-step authentication? Or does that present another security risk? If those phones are out-dated, do you have a secure way of destroying old devices? Ship n Destroy offers a safe, economical way to securely destroy smartphones, laptops, and servers. Check out our services here: shipndestroy.com

 

Next month we’ll talk about Two-Step Authentication.  What it is and how you can use it.