• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Why passwords should die

Allan Tan by Allan Tan
November 24, 2022
Why passwords should die

Why passwords should die

According to Reader’s Digest, 123456 is the most common password in use today, ahead of 123456789 and 1234567890.

It is no wonder that 80% of breaches on the web today are a result of stolen credentials. We make it so easy. Unfortunately, human nature suggests this habit is not going to go away.

Andrew Shikiar, executive director of the FIDO Alliance, says passwords pose a significant risk to businesses and consumers.

The context of his argument is that most data breaches and credential attacks are caused by passwords, i.e., they are too easy for hackers to manipulate.

“Simply put, passwords just aren't suitable for today's connected society,” he concluded.

Acknowledging that passwords are notoriously insecure, Ian Hall, head of client services SIG for APAC at Synopsys, doesn’t see passwords going away because they are convenient and easy to implement. It is these same characteristics that lend to their ease of cracking.

“Password fatigue further exacerbates the problem, with users reusing the same password across multiple applications, websites, and systems,” added Rohan Ramesh, director of identity and access management at Entrust.

The good news is that efforts are underway to find suitable alternatives to securely access applications and data other than passwords. One such approach is the use of Passkeys.

What is a Passkey

Hall says a passkey is a cryptographic replacement of a password that is based on open standards from the FIDO Alliance (FIDO is Fast ID Online).

“Instead of using a password, a cryptographic keypair is generated for every website that you need to authenticate with (think of this as a unique, extremely complicated password for each website).

“A difference though is that half of the keypair (the public key) is shared with the website and the other half of the keypair (the private key) is stored securely on your own device which could be a mobile, tablet or computer.

“When you log on to a website, a challenge is performed using the keypairs and since mathematically, only the private key can pass that challenge, the website can be assured you are whom you say you are – you are authenticated,” explained Hall.

Andrew Shikiar

Shikiar adds that passkeys don't always need to be synced across an operating system cloud.

“Single device passkeys (such as those available on FIDO security keys) can also be used for passwordless sign-ins — this is critical for use cases that may require higher security or have specific regulatory requirements."

Andrew Shikiar

What makes Passkeys better

Ramesh claims that passkeys eliminate the potential for attacks that traditional passwords are susceptible to such as phishing or adversary-in-the-middle (AiTM).

He also claimed that with passkeys, there is no password fatigue, as every application creates a unique key pair, and every authenticating device is assigned a device-bound key with multi-device passkeys.

Best use cases for passkeys

Shikiar claims that passkeys are better suited for authentication than passwords in just about every scenario.

“We believe that passkeys will be immediately applicable to the vast majority of consumer use cases where requiring a password is both an inconvenience for the consumer as well as a risk and liability for the service provider,” he added.

Hall adds that passkeys simplify the process for end-users because they no longer need to remember a new password for every website.

“Since the passkeys are stored securely on the user’s device, they simply unlock it in the same way they normally do – perhaps using facial recognition, fingerprints, or a device PIN. It is also more secure since it is based on cryptography without the need for a secret to be stored by the website, making it resistant to phishing attacks.”

Ian Hall

“There is also a matter of convenience since the passkeys are securely synchronized between devices in the event a user loses their mobile device, they can recover the keys and continue logging on to websites,” he added.

Anything better than passkeys

Shikiar noted that while passkeys deliver increased security and a more frictionless user experience, it has only recently gained support from major platform vendors – which means applications and systems need to be updated to support passkeys.

Hall begrudgingly said that older devices will need to be upgraded – and this will take time.

What needs to happen to passkey adoption

Shikiar believes that the superior usability of passkeys in and of itself will create demand for companies to support passkeys.

Hall noted that passkey adoption is something that all organisations should be looking at since their data and their customer’s data is extremely important.

“With all the hacks and data breaches in the news, they should be asking themselves, what are the basic steps that we should be doing to protect that data? If organisations are already using single sign-on tools such as Azure AD and Okta, they provide an easy way to migrate to FIDO credentials such as passkeys,” he added.

Ramesh concedes the challenges that organisations will face in adopting them as the default authentication mechanism.

For starters, passkeys are managed and stored by platforms, such as Apple, Google and Microsoft, and this may go against compliance or organisations’ policies. In addition, passkeys are synced to users’ cloud accounts managed by platform vendors (i.e., iCloud, etc), which can violate company policy,” he added.

How to successfully adopt passkeys

Ramesh believes that the successful adoption of passkeys, especially in the customer identity access management (CIAM) space, will require organisations to incorporate user-friendly user experience changes.

Rohan Ramesh

“To help minimise disruption during onboarding, it’s important to have the option to sign in securely using passkeys, along with proper documentation on the benefits of using the passwordless option. In addition, getting rid of unwanted steps such as validating emails and requiring usernames when signing in will make the process more seamless and increase adoption."

Rohan Ramesh

Hall is both optimistic and wary of the (adoption) process.

“The onboarding process is relatively simple and can be done following authentication using any existing password-based mechanism. Since Windows/Mac/iPhone/Android will all support this very soon, separate devices will not need to be rolled out to users. I still remember the huge collection of OTP dongles that I collected years ago and would really like to avoid that repeating,” he concluded.

Related:  Singapore proposes banning election-related AI-generated misinformation
Tags: EntrustFIDO Alliancemultifactor authenticationPasskeypasswordSynopsys
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe