How Big Tech is Working Towards a Password-Free Future

How Big Tech is Working Towards a Password-Free Future

Whenever there is a big hack, we are often advised by security experts to not only stop using the same passwords but to stop memorizing passwords altogether and make use of password managers.

A 2019 research conducted by HYPR showed that 78% of people forgot their passwords and required a reset within the last 90 days. Passwords aren’t just difficult to manage, they are inconvenient, insecure, and expensive because passwords are just too easy to guess, hack or intercept and what’s more, the legacy of password reuse is leading to constant attack and account vulnerabilities.

Hackers try to get your passwords through different means, this is especially bad for people who use the same or similar passcodes, so when one account gets hacked their other accounts become vulnerable. Most data breaches originate from stolen passwords as bad passwords are one of the easiest ways to compromise a system, it could take seconds for a computer to go through the list of possible password combinations for someone who has a simple 8 character password.

Password managers

Whenever there is a big hack, we are often advised by security experts to not only stop using the same passwords but to stop memorizing passwords altogether and make use of password managers; software applications designed to store and manage your online credentials and make your accounts more secure by freeing the user from having to generate and remember sufficiently complex passwords, thus allowing for single-purpose passwords that meet a much higher level of security. 

Two Factor Authentication

Passwords have come a long way since its creation in the early 1960s with the inventions of new types of authentication like fingerprint scanners, face-scanning technology, and two-factor authentication.

Two-factor authentication has to do with using two forms of authentication, it deals with the combination of two of the three forms of authentication, which are;

  1. What you know: your pin, username, password and even the answer to a security question
  2. What you have: your sim card, mobile number, bank card, key card an access token/badge
  3. Who you are: biometrics like facial recognition, fingerprint and iris scanning

Two-factor authentication is far more secure than passwords alone because it takes into account two forms of authentication rather than one. A common form of two-factor authentication is withdrawing money from an ATM; using your pin code and your bank card.

Other methods of two-factor authentication include using an authenticator app like Google authenticator or Microsoft authenticator, SMS Codes, and biometrics alongside your password for more secure verification, however, some forms of two-factor authentication are not as secure as others.

data-security security

Bootstrap 5 Complete Course with Examples

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

Building a simple Applications with Vue 3

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

Applications Of Data Science On 3D Imagery Data

The agenda of the talk included an introduction to 3D data, its applications and case studies, 3D data alignment and more.

Data Quality Testing Skills Needed For Data Integration Projects

Data Quality Testing Skills Needed For Data Integration Projects. Data integration projects fail for many reasons. Risks can be mitigated when well-trained testers deliver support. Here are some recommended testing skills.

Data Lakes Are Not Just For Big Data - DZone Big Data

A data expert discusses the three different types of data lakes and how data lakes can be used with data sets not considered 'big data.'

Cloud Security: Is it Worth it?

Storing and managing corporate data by applying the cloud is becoming more and more popular. Companies grow, and it gets too expensive, and resources consuming to store their data on traditional servers. To prove it, look at the research conducted by Google in 2019 that includes insights for the cloud computing market for the next 10 years.

What Exactly Is Data Governance?

The first step is to understand what is data governance. Data Governance is an overloaded term and means different things to different people. It has been helpful to define Data Governance based on the outcomes it is supposed to deliver. In my case, Data Governance is any task required for.