drj logo

"*" indicates required fields

Name*
Address*
Password*
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2023
    • DRJ Spring 2024
    • DRJ Spring 2024 – Call for Papers
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Directory
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DE&I
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Passwordless Authentication 101

by Jon Seals | January 18, 2023 | | 0 comments

Executive Summary: Passwords are ineffective security controls. If your organization is using password authentication, you’re more at risk of cyber-attacks against your organization succeeding. Make plans to move systems to Passwordless Authentication.  

What is Passwordless Authentication? Passwordless authentication is session-level validation of digital identities that compares previously registered credentials against those presented at the time of the authentication request but does not rely on users remembering and entering passwords. Instead, Passwordless Authentication systems leverage public key crypto and various biometric factors. Passwordless authentication systems do not require transmission or storage of user passwords or passwords hashes. 

Year after year, studies show that compromised passwords are a key vector in the majority of cyber-attacks and data breaches. For example, consider the Verizon Data Breach Reports over the last 15 years. Passwords can be phished, brute force guessed, collected by malware, and sold by and to cybercriminals on the dark web. Knowledge-based authentication, or security questions, are usually even more insecure as an account recovery mechanism than passwords themselves.  

Multi-Factor Authentication (MFA) is using two or more of the “something you have, something you know, or something you are” factors. Many MFA systems start with a password and add additional factors, such as mobile phone biometrics, SMS codes, or other obtrusive challenges. But in those cases, users still have to know the password in order to get in, so this is requirement is a substantial inconvenience to the user and opportunity for attackers. 

The notion of Passwordless Authentication has been around for a while. However, as in the early MFA use cases, some “passwordless” solutions still have hidden or rarely used passwords. These are really “password-fewer”, not passwordless. Examples of password-fewer solutions are operating systems that allow users to use facial or fingerprint recognitions for most authentication events, but occasionally require the user to sign in with a password. Password-fewer scenarios increase usability for the end user most of the time but retain the risks of password authentication systems. Attackers are not going to try to copy and present forged user biometric templates if text-based passwords can be compromised instead. 

FIDO is a leading standard for Passwordless Authentication. Though some FIDO compliant solutions utilize PINs, many FIDO certified solutions can enable fully Passwordless Authentication experiences. 

Contemporary MFA solutions can also employ Passwordless Authentication technologies. Some solutions allow customers to designate multiple crypto challenges, biometrics, and behavioral biometrics as factors for evaluation rather than passwords or KBA questions. Moreover, these factors can be used for registration and account recovery. 

For more information on Passwordless Authentication solutions, see the KuppingerCole Leadership Compass on it athttps://www.kuppingercole.com/research/lc81215/passwordless-authentication. KuppingerCole is launching a new service for customers that will allow users to interactively review products in the Passwordless Authentication market. Check back in the next couple of weeks to see how this service can assist you in selecting the right Passwordless Authentication product for your organization.  

Related Content

  1. The Hidden Costs of Passwords
  2. Fortifying Global Communications Security with Phone Number Intelligence Data
  3. How to Defend Against Cyberattacks That Take Over Admin Accounts

Recent Posts

Shift4 Partners with Give Lively to Offer Powerful Fundraising Solution to Nonprofits

September 23, 2023

NCR Corporation Announces Timing and Additional Details Regarding its Previously Announced Separation

September 22, 2023

Disappointment and Hope after U.N. General Assembly Wraps, says AHF

September 22, 2023

Forward Air Corporation Announces Pricing of Private Offering of $725 Million of Senior Secured Notes

September 22, 2023

Twilio recognized as a Leader in 2023 Magic Quadrant for CPaaS

September 22, 2023

SLB Announces Third-Quarter 2023 Results Conference Call

September 22, 2023

Archives

  • September 2023 (817)
  • August 2023 (1202)
  • July 2023 (956)
  • June 2023 (1245)
  • May 2023 (1206)
  • April 2023 (1145)
  • March 2023 (1336)
  • February 2023 (1154)
  • January 2023 (1391)
  • December 2022 (1144)
  • November 2022 (1595)
  • October 2022 (1574)
  • September 2022 (1571)
  • August 2022 (1581)
  • July 2022 (1365)
  • June 2022 (1711)
  • May 2022 (1651)
  • April 2022 (1618)
  • March 2022 (1924)
  • February 2022 (1549)
  • January 2022 (1472)
  • December 2021 (1446)
  • November 2021 (1835)
  • October 2021 (1777)
  • September 2021 (1697)
  • August 2021 (1661)
  • July 2021 (1566)
  • June 2021 (1768)
  • May 2021 (1666)
  • April 2021 (1798)
  • March 2021 (1907)
  • February 2021 (1038)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2023
    • Spring 2024

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2023 Disater Recovery Journal
    • Terms of Use
    • Privacy Policy