• Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to

Are Passwords Soon Going to Be a Thing of the Past?

Are Passwords Soon Going to Be a Thing of the Past?

Did you know that over 80 percent, eight-zero, of cyberattacks are the result of stolen access credentials? It’s no wonder that the username/password combination that we’re all used to is being actively phased out by many tech companies—including Microsoft—in favor of more secure, passwordless authentication measures.

What is Passwordless Authentication?

Passwordless authentication is exactly what it sounds like it would be: instead of relying on a password, identify verification is accomplished through other means. These means could be a verification application, a security token, or even biometric information.

Chances are good that you’ve used this kind of authentication before. If your phone unlocks when it registers your fingerprint or your face, or you’ve received a verification code via a text message, for instance, you have. While not all varieties of passwordless authentication are as secure as others, they still prevent many of the weaknesses that you’d find in a traditional username/password strategy:

  • Insufficient strength, making brute-force attempts much simpler for cybercriminals
  • Without a password, users cannot reuse passwords across different accounts
  • Brute force attacks require a password to be present to work, which passwordless authentication negates

Why Businesses Are Adopting Passwordless Authentication

Cost Effectiveness

Passwords can require some significant investment from businesses. In fact, Forrester Research shared estimates that each reset can cost a company $70. Passwordless authentication eliminates this, by having no passwords that need to be reset in the first place.

User Experience and Convenience

How many passwords are you expected to remember? If you’re like the average user, there are dozens, so in all honesty it makes sense that so many undermine their own security with insecure password practices. Security can be better ensured by making it more convenient for the user than otherwise—something that passwordless authentication accomplishes.


Of course, we must address how your security can be benefitted by passwordless authentication. As cybercriminals are increasingly relying on human vulnerabilities, phishing attacks are much more common, as are other password-focused attacks like credential stuffing and brute force attacks. Removing the password in its current state can greatly reduce how effective these threats can be.

This is one of the reasons that Microsoft has been so enthusiastic about passwordless authentication.

Microsoft’s Approach to Security

Microsoft has been transitioning to passwordless authentication. Not only were there 150 million user accounts utilizing passwordless authentication as of last May, 90 percent of its own 150 thousand employees are now using passwordless and saving Microsoft 80 percent of the support costs once associated with internal password management. As these efforts have been paired with multi-factor authentication, Microsoft has also seen this feature take off.

Considering that passwordless authentication has been shown to be…

  • More secure
  • More affordable
  • More user-friendly
  • More manageable
  • And more convenient

…it’s safe to assume that we should observe an increased shift to these solutions in the relatively near future.

Data Net can assist you in implementing the best security solutions available. Reach out to us at (760) 466-1200 to learn more.

Trying to Secure Our Votes, Online
Tip of the Week: Mobile Malware’s Warning Signs


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 26, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication Hackers IT Support Malware Google Smartphones Email Cloud Small Business Innovation Hardware User Tips Microsoft VoIp Software Communications Users Workplace Tips Cybersecurity Managed IT Services Mobile Device Computer Business Collaboration Internet Tech Term Android Hosted Solutions Mobile Devices Business Management Ransomware Outsourced IT Miscellaneous Social Media Windows 10 Cloud Computing Passwords Backup Phishing Information Browser IT Services Managed Service Smartphone Network Covid-19 Data Backup Upgrade Apps Saving Money Wi-Fi Data recovery Facebook Applications Networking Microsoft Office Internet of Things Wireless Windows Gadgets Bandwidth Holiday Access Control Chrome Automation Employer-Employee Relationship Data Breach Apple Gmail Quick Tips Marketing Patch Management VPN Compliance Remote Work BDR Managed IT services Blockchain Mobile Office Office 365 Employee-Employer Relationship Save Money Word Laptop Health Voice over Internet Protocol Conferencing Router Value Going Green Analytics Managed IT Service Business Intelligence Mobility Excel Tech Terms Cost Management Content Filtering Computers Bring Your Own Device Remote Monitoring and Management Data Protection Batteries Scam RAM Server Settings Medical IT Telephony Windows 7 Twitter Mobile Device Management Artificial Intelligence Cybercrime iPhone Password Business Continuity Connectivity Business Technology Remote Monitoring Payment Cards Education Company Culture Disaster Recovery Battery Social Network How To Paperless Office Cortana Virus Retail Government Remote Computing Healthcare Remote Wireless Charging Telephone System Processor Physical Security Net Neutrality Data Management Office Virtual Assistant G Suite Data Security Virtualization Wireless Internet User Tip Spyware Display Safety IT Service Downloads Dark Web Sales Online Shopping Human Resources Update Taskbar Data loss Hosted Desktop Sports Reporting Cryptocurrency Project Management Regulations Compliance Hard Disk Drive Multi-Factor Authentication Database Managed Service Provider Threat Personal Information Big Data Technology Tips Authorization Amazon Training Benchmarks Edge Mobile Trends Error Tablet Managed Services Provider Network Attached Storage Environment Hybrid Cloud Outlook WannaCry Help Desk National Security HP Spam Firewall User Security Congratulations Search IT budget Meetings Video Botnet Co-Managed IT Printing Workers E-Commerce Bitcoin Travel Management Microsoft Teams Comparison e-waste Tip of the week Security Cameras Risk Management Dongle Recovery A.I. Electronic Health Records Vendor Cables Profitability HIPAA Website Document Management Antivirus Profiles SaaS Voice over IP Time Management Insurance WhatsApp Inventory Printer Customer Service Holidays Machine Learning Tactics Humor Paper File Sharing Millennials Payment Backup and Disaster Recovery Remote Working Specifications disposal Wearables Licensing Virtual Reality Movies Touchscreen Knowledge News Eliminating Downtime Hard Drive Updates Staff Shadow IT GDPR Chrome OS File Management IT Management Mobile Security Encryption Lead Generation OneNote Memes Ink instant Messaging Threats Live Streaming Hard Drives Managing Stress Server Management Virtual Private Network Maintenance Plug-In Tech Support Microsoft Office 365 Employees Distribution Innovations BYOD Processors Certification Digital Websites Computer Repair Streaming Media Storage eCommerce Current Events Operating System Windows Server 2008 R2 Remote Support Telecommute IT PowerPoint Vulnerabilities Scams SSD PCI DSS Troubleshooting Fleet Management Cleaning Customer Relationship Management Internet Explorer Proactive IT Law Enforcement Telecommuting Recycling Alert Vulnerability Remote Workers Unified Communications Authentication Solid State Drive Thank You Analysis Financial Printers WiFi Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123