Many software and technology companies have innovated in the area of password protection and are creating easier-to-use alternatives. Apple’s “Face ID” which uses biometric scanning to unlock your phone is probably the most widely used of these innovations.
Passwords are a pretty laughable method of authentication and can be scooped up by scammers pretty easily—from sheer brute force to simple phishing. Here are some password alternatives along with the pros and cons of each.
Two-Factor Authentication
What you really need is a second way to verify yourself. That’s why many internet services, a number of which have felt the pinch of being hacked, offer two-factor authentication. It’s sometimes called 2FA, or used interchangeably with the terms “two-step” and “verification” depending on the marketing.
2FA increases the safety of online accounts by requiring two types of information from the user, such as a password or PIN, an email account, an ATM card or fingerprint, before the user can log in. The first factor is the password; the second factor is the additional item.
Used on top of the regular username/password verification, 2FA bolsters security by making it more difficult for intruders to gain unauthorized access—even if a perpetrator gets past the first authentication step.
The downsides to 2FA are increased login time, integration, and maintenance. These can feel like a chore, but the increased security is well worth the effort.
Biometrics
Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data.
Examples of these biometric identifiers are fingerprints, facial patterns, voice, or typing cadence. Each of these identifiers is considered unique to the individual, and they may be used in combination to ensure greater accuracy of identification.
Biometric authentication is convenient, but privacy advocates fear that biometric security erodes personal privacy. The concern is that personal data could be collected easily and without consent.
The risks are real, but biometric technology still offers very compelling solutions for security, as the systems are convenient and hard to duplicate.
Magic Links / OTP
Magic links are a kind of authenticated URL, which you send to the user in the form of an SMS/email that helps them log in to the system with just one click of the link without any human interaction (no need for the user to enter username and password).
It’s clear what the advantages of passwordless authentication are. In theory, a passwordless world means you don’t have to remember any passwords. Apps you trust log you into other apps, and when that fails, email and SMS come to the rescue.
The issue with passwordless authentication is the same as reusing passwords; if a malicious third party gains access to your login apps or your email, then they can access all of your accounts.
This means that whether you’re using passwords or passwordless authentication, activating a second factor to log into accounts is still crucial.
Physical Keys
Physical keys are small physical devices that plug into a USB port on your computer and works with the Chrome browser and platforms that enable it (like Google, Facebook, GitHub, Dropbox). You can carry it on a keychain like a regular key.
Security keys protect you against phishing. If someone doesn’t have the physical key, they can’t log in as you. Google Authenticator generates a numerical code, which could potentially be phished. Both are safer than using a login code sent to you over SMS.
The downside is that if you lose the both the security key and the recovery code, you’ll need to prove your identity to the site’s satisfaction. What this means will be different for each site. Expect to spend a lot of time on the phone.
SSO
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials—for example, a name and password—to access multiple applications.
The upsides to SSO include reducing password fatigue, simplifies username and password management, and improves identity protection. When changes of personnel take place, SSO reduces both IT effort and opportunities for mistakes. Employees leaving the organization relinquish their login privileges.
One of the challenges of SSO is that extra-strong passwords must be enforced. SSO can also take longer than expected to set up. Each environment is different, so added steps in implementation can crop up.
Another Day, Another Password
Our daily interactions with tech require us to consider security. More and more of both our business and personal data is being uploaded onto apps, file-shares, and other cloud applications. Don’t you think it’s worth safeguarding that data? These password alternatives will give you options that make your life easier while protecting you and your data.