Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Are Passwords Soon Going to Be a Thing of the Past?

Did you know that over 80 percent, eight-zero, of cyberattacks are the result of stolen access credentials? It’s no wonder that the username/password combination that we’re all used to is being actively phased out by many tech companies—including Microsoft—in favor of more secure, passwordless authentication measures.

What is Passwordless Authentication?

Passwordless authentication is exactly what it sounds like it would be: instead of relying on a password, identify verification is accomplished through other means. These means could be a verification application, a security token, or even biometric information.

Chances are good that you’ve used this kind of authentication before. If your phone unlocks when it registers your fingerprint or your face, or you’ve received a verification code via a text message, for instance, you have. While not all varieties of passwordless authentication are as secure as others, they still prevent many of the weaknesses that you’d find in a traditional username/password strategy:

  • Insufficient strength, making brute-force attempts much simpler for cybercriminals
  • Without a password, users cannot reuse passwords across different accounts
  • Brute force attacks require a password to be present to work, which passwordless authentication negates

Why Businesses Are Adopting Passwordless Authentication

Cost Effectiveness

Passwords can require some significant investment from businesses. In fact, Forrester Research shared estimates that each reset can cost a company $70. Passwordless authentication eliminates this, by having no passwords that need to be reset in the first place.

User Experience and Convenience

How many passwords are you expected to remember? If you’re like the average user, there are dozens, so in all honesty it makes sense that so many undermine their own security with insecure password practices. Security can be better ensured by making it more convenient for the user than otherwise—something that passwordless authentication accomplishes.


Of course, we must address how your security can be benefitted by passwordless authentication. As cybercriminals are increasingly relying on human vulnerabilities, phishing attacks are much more common, as are other password-focused attacks like credential stuffing and brute force attacks. Removing the password in its current state can greatly reduce how effective these threats can be.

This is one of the reasons that Microsoft has been so enthusiastic about passwordless authentication.

Microsoft’s Approach to Security

Microsoft has been transitioning to passwordless authentication. Not only were there 150 million user accounts utilizing passwordless authentication as of last May, 90 percent of its own 150 thousand employees are now using passwordless and saving Microsoft 80 percent of the support costs once associated with internal password management. As these efforts have been paired with multi-factor authentication, Microsoft has also seen this feature take off.

Considering that passwordless authentication has been shown to be…

  • More secure
  • More affordable
  • More user-friendly
  • More manageable
  • And more convenient

…it’s safe to assume that we should observe an increased shift to these solutions in the relatively near future.

Direct Technology Group can assist you in implementing the best security solutions available. Reach out to us at 954-739-4700 to learn more.

Trying to Secure Our Votes, Online
Tip of the Week: Mobile Malware’s Warning Signs


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 September 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Google Network Security Hackers Data Malware Microsoft Innovation Software User Tips Business Hardware Email Smartphones Communication Hosted Solutions Miscellaneous Backup Workplace Tips communications Mobile Devices Computer Internet Small Business Android IT Support Cybersecurity Smartphone Productivity Business Management Ransomware VoIP Outsourced IT Social Media Upgrade Collaboration Browser Windows 10 Users Windows Mobile Device Managed IT Services Network Passwords Tech Term Microsoft Office Automation IT Services Windows 10 Bandwidth Save Money Business Continuity Employer-Employee Relationship Holiday Cloud Computing Apps Managed IT Services Facebook Quick Tips Office Phishing Internet of Things Marketing Data Backup Chrome Gadgets Managed Service Disaster Recovery Wireless Saving Money Mobile Device Management Data Recovery Apple Information Networking Wi-Fi Health Gmail Server IT Support Router Alert Analytics Applications Password Covid-19 Computers Managed Service Provider App Access Control Data Breach Office Tips Hacking Virtualization Remote Computing Business Intelligence Settings Mobility Retail Cybercrime VPN Office 365 Law Enforcement Remote Monitoring iPhone BYOD Battery Application Recovery Excel Going Green Twitter Blockchain Patch Management Website Laptop Physical Security Operating System Data Management BDR Remote Work Government Mouse Managed IT Service Compliance Entertainment WiFi Artificial Intelligence Big Data Voice over Internet Protocol Bring Your Own Device Environment Value Virus Maintenance Social Engineering Conferencing Lithium-ion battery Google Drive Printer Word Spam Safety Workers Telephone Systems Humor Mobile Computing Biometrics Paperless Office VoIP Employee-Employer Relationship Politics History Customer Relationship Management Processor Business Technology Shadow IT Healthcare Scam Company Culture Vulnerability Risk Management Customer Service Smart Technology Cortana Internet Exlporer Data Security G Suite Telephony Fax Server Files Streaming Media The Internet of Things Data storage Medical IT Two-factor Authentication Connectivity End of Support Encryption Current Events Remote Batteries Search Hosted Solution eWaste PowerPoint Telephone System Education Wireless Charging Dark Web User Error Payment Cards Best Practice Virtual Reality Tip of the week Shortcut Tablet Content Filtering Windows 7 HIPAA Virtual Assistant Hybrid Cloud Data Protection Mobile Office Remote Monitoring and Management Human Resources Printer Server How To Cost Management RAM Tech Terms Sports Cleaning Managing Stress Meetings Net Neutrality DDoS Robot Tech Support IT solutions Hard Drives Information Technology Social Network Troubleshooting Webcam Regulations Compliance Printing Processors Licensing Distributed Denial of Service Gadget Budget Memory Server Management Distribution YouTube Alerts Inventory Computer Repair Phone System Electronic Health Records Worker Update Innovations Paper User Spyware Travel Display NarrowBand Machine Learning Fleet Management Work/Life Balance Mobile Security IT Service Downtime Employees Programming Reporting Outlook Avoiding Downtime Ink HP Live Streaming Benchmarks Wireless Technology Sales E-Commerce Automobile Cables Telecommute Multi-Factor Authentication e-waste Mobile Voice over IP Multi-Factor Security SharePoint Solid State Drive Recycling Profitability Bluetooth Document Management WhatsApp Chromecast Knowledge Payment Analyitcs Data loss Holidays GDPR disposal Monitor eCommerce Hard Disk Drive Access Eliminating Downtime Hacker Downloads USB Internet exploMicrosoft Digital News Notifications Comparison Copy instant Messaging Antivirus Techology Staff Virtual Private Network Storage Remote Workers Reputation Online Shopping Video Printers Bitcoin Wireless Internet Google Maps Science Trends Advertising Edge Co-Managed IT Specifications Paste Vulnerabilities Amazon HaaS Websites Error Spotify Consultant Customer Computer Accessories OneNote Help Desk Windows 8 A.I. Private Cloud Memes Cryptocurrency Personal Information Plug-In Flexibility Dongle Touchscreen Cabling Management Database Best Available Lead Generation Cameras Wearable Technology Windows Server 2008 R2 Social Threats Hiring/Firing Certification Botnet Movies Public Cloud IT budget File Management Remote Support IT Touchpad Remote Control People SaaS Bloatware Proactive IT Legal Microsoft Office 365 Remote Working Tactics Running Cable Taskbar Scams Staffing Training Managed IT Unified Communications IT Management Managed Services Provider Uninterrupted Power Supply Hosted Desktop WIndows 7 User Tip Unified Threat Management Spam Blocking Time Management Entrepreneur Technology Tips Authentication Windows XP Internet Explorer Relocation WannaCry National Security Social Networking Windows Media Player Project Management Security Cameras Tablets PDF Vendor File Sharing Firewall Telecommuting Email Management Chrome OS Analysis Video Games Backup and Disaster Recovery Authorization PCI DSS Threat Hard Drive Updates Insurance Wearables Microsoft Teams Network Attached Storage User Security SSD Profiles Black Market Millennials