{"id":51,"date":"2018-02-20T19:01:51","date_gmt":"2018-02-20T19:01:51","guid":{"rendered":"https:\/\/www.shipndestroy.com\/blog\/?p=51"},"modified":"2018-02-22T14:40:57","modified_gmt":"2018-02-22T14:40:57","slug":"are-passwords-a-thing-of-the-past","status":"publish","type":"post","link":"https:\/\/www.shipndestroy.com\/blog\/are-passwords-a-thing-of-the-past\/","title":{"rendered":"Are Passwords a Thing of the Past?"},"content":{"rendered":"<p>We are all too familiar with the necessity to have long and strong passwords.\u00a0 Passwords protect everything we do, off and online.\u00a0 However, Microsoft sees a future without passwords.<\/p>\n<p>For some time, Microsoft has turned the focus away from using a password to log into your computer via PIN codes, fingerprint sensors (if you have the hardware) and facial recognition.\u00a0 In an upcoming build of a stripped down version of Windows 10, called Windows 10 S, Microsoft is using its Authenticator App for Android and iOS.\u00a0 This app produces an 8-digit code every minute that is unique to your phone.\u00a0 This means that if your computer were stolen or someone tried to access it while you were away, they couldn\u2019t simply to just guess your password but would require your phone as well.<\/p>\n<p>But why tie our access to a smartphone and not focus on facial recognition or fingerprint scanners?\u00a0 To put it simply, they really don\u2019t measure up.\u00a0 Facial recognition can be thwarted by identical twins or even by people who have similar facial structures.\u00a0 Fingerprint scanners can fail repeatedly causing frustration.\u00a0 Both issues have been a problem that has plagued iPhone users.\u00a0 To implement this technology in a business setting can be quite costly and troublesome, especially for non-tech companies.\u00a0 In America, 77% of the adults have a smartphone and companies like Google and LastPass have Authenticator software freely available that can be used.\u00a0 (<a href=\"http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/\">http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/<\/a>)<\/p>\n<p>The biggest issue that companies face is implementing these changes.\u00a0 Changing the habits of people who, throughout their entire lives, use a username and password is a challenge to change.<\/p>\n<p>\u201cWe&#8217;re putting all the focus on technology and not thinking about explaining to people,&#8221; said William Beer, a principal at business management consultancy EY. &#8220;I would suggest that while technology is great, it needs to be accompanied by a significant awareness campaign to explain and support users as they go through these changes.&#8221; \u2013 <a href=\"http:\/\/www.latimes.com\/business\/technology\/la-fi-tn-password-microsoft-20180211-story.html\">Los Angeles Times<\/a><\/p>\n<p>Now we circle back to BYOD attacks \u2013 do your employees use their own cell phones for two-step authentication? Or does that present another security risk? If those phones are out-dated, do you have a secure way of destroying old devices? Ship n Destroy offers a safe, economical way to securely destroy smartphones, laptops, and servers. Check out our services here: shipndestroy.com<\/p>\n<p>&nbsp;<\/p>\n<p>Next month we\u2019ll talk about Two-Step Authentication.\u00a0 What it is and how you can use it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are all too familiar with the necessity to have long and strong passwords.\u00a0 Passwords protect everything we do, off and online.\u00a0 However, Microsoft sees a future without passwords. For some time, Microsoft has turned the focus away from using a password to log into your computer via PIN codes, fingerprint sensors (if you have &hellip; <a href=\"https:\/\/www.shipndestroy.com\/blog\/are-passwords-a-thing-of-the-past\/\">More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-51","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":2,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/51\/revisions"}],"predecessor-version":[{"id":53,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/51\/revisions\/53"}],"wp:attachment":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/categories?post=51"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/tags?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}