logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
F-Secure
14th December 2018 by CyberVision 0 Comments 909 Views
14th December 2018 by CyberVision in F-Secure

Is the future Passwordless?

Nearly all data breaches begin with compromised passwords, yet the importance of passwords is still being underplayed in society today. Passwords have infamously been dubbed as the weakest link in any company’s security defences and with good reason: Password reuse, a lack of strong password etiquette, failing to change them on a regular basis and other human errors continue to challenge users with this standard authentication. Irrespective of the immature state of its adoption, password alternatives are the way forward and most business owners are now set on finding ways to alleviate the risks involved with password protection.

 

Cyber attacks usually occur in the form of phishing or brute force attacks, but the password remains the first (and sometimes the only) line of defence against these malicious online attacks. The prevalence of these attacks reiterates the need for effective access protection. Technological advances have opened doors leading towards prospective alternatives for the actual use of passwords but these ideas are far from close to replacing passwords completely.

 

Password policies should be improved, but this alone cannot mitigate all attacks against passwords. The focal point should be aimed at assessing and implementing the technical controls that can effectively decrease the likelihood and consequences of the majority of identity-related attacks.

 

Gartner has predicted that, “through the end of 2020, enterprises that invest in new authentication methods and compensating controls will experience 50% fewer identity-related security breaches than peers that do not”.

 

Companies should ideally look for solutions that improve the use passwords rather than focussing on getting rid of them altogether. There is still effectively only one authentication scheme that is used globally and that every person knows how to use reasonably efficiently. Efforts should be geared towards the advancement of both passwords and their alternatives alike.

 

 

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure
  • f-secure cyber security
  • passwordless
  • threats
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo