094 90 48200    Get SUPPORT

Aniar IT Services Blog

Are Developers Going to Eliminate the Password?

Are Developers Going to Eliminate the Password?

A lot is made about data breaches and hackers, but I think you’d be surprised to find out that over 80 percent of cyberattacks are the result of stolen authentication credentials. This has led many security-minded IT administrators to try and find a better way than the old username & password strategy that we’ve all been using for as long as there have been user accounts. One organization that is actively making waves trying to replace the username/password combo is Microsoft. They are at the forefront of the move to passwordless authentication.

What Exactly is Passwordless Authentication?

Instead of using passwords, you would effectively verify your identity through alternative means such as a verification app, a predefined security token, or even biometric information. These forms of authentication aren’t exactly new--most smartphones have a biometric authentication system onboard--but now they are beginning to become the predominant way that IT administrators set up their authentication systems. 

Why Is This Shift Happening?

Reduced Cost

You may be surprised, but passwords actually can cost a business a lot of money. A study by Forrester Research found that each password reset can cost a company $70. By using passwordless authentication, there are no passwords to reset, so these costs are completely eliminated. 

User Experience and Convenience

Every account you have has its own password. With more and more accounts being added each day, managing all the passwords that you need to remember can get difficult. Using methods that don’t require the need to remember passwords removes these challenges. 


The main reason passwords are used is for security, but with so many hackers and scammers trying to get people to mistakenly give over their passwords through phishing attacks and other social engineering attempts, removing that possible vector can immediately make a computing network more secure.

Microsoft’s Approach to Security

For the past few years, Microsoft has been transitioning to a passwordless authentication system. In May, over 150 million users were utilizing some type of passwordless authentication, including 90 percent of the software giant’s 150,000 employees. Microsoft has gone on the record stating that it is saving 80 percent of the support costs that they had seen with password-fueled systems. 

At this point passwordless authentication seems to be a no-brainer. It is more secure, more affordable, better for the user, and far more manageable.

At Aniar IT Services, our IT experts can assist you in implementing passwordless authentication for your company. Give us a call to learn more at 094 90 48200. Of course, if you do continue to use passwords, be sure you use strong passwords!

Tip of the Week: Simple Solutions to a Few Android...
Gmail Templates Can Speed Up Your Communications


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, October 28 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Productivity Business Computing Best Practices Email Privacy Cloud Efficiency User Tips Workplace Tips Network Security Innovation Hosted Solutions Internet Google Microsoft Data IT Support Hardware Software Hackers Business Collaboration VoIP Communication Data Backup Cybersecurity Mobile Device Managed IT Services Small Business Data Recovery Users Smartphone Communications Tech Term Smartphones Android Mobile Devices Computer Windows 10 Phishing Cloud Computing Network IT Services Malware Backup Gadgets Outsourced IT Business Continuity Windows Miscellaneous Saving Money Artificial Intelligence Browser Managed Service Disaster Recovery Spam Business Management Internet of Things Facebook Information Server Office 365 Upgrade Passwords Covid-19 Quick Tips Chrome BDR Automation Social Media BYOD Wi-Fi Router Microsoft Office How To Paperless Office Save Money Holiday Mobile Office Windows 7 Operating System Word Applications Cybercrime Encryption Apps Networking Computers Data Security Data Storage Blockchain Data Protection HIPAA Vulnerability Government Remote Work Telephone System Mobile Device Management Patch Management Connectivity Two-factor Authentication Display Ransomware Infrastructure Remote Monitoring Human Resources Settings History Money Virtualization Bandwidth Staff Managed IT Data Breach Big Data Business Intelligence Vendor Management Update Business Technology Hard Drive Website Spam Blocking Botnet Health Office Managed IT services Servers Bring Your Own Device Education Managed Services Provider Identity Theft IT Management Wireless Redundancy Voice over Internet Protocol Vendor App Procurement Telephone Systems Social Engineering Help Desk Meetings Conferencing Machine Learning Google Drive Avoiding Downtime Access Control Compliance Digital Signage Sports Cryptocurrency Employee/Employer Relationship CES WiFi Augmented Reality Fraud Comparison Software as a Service Audit Training Private Cloud IT Plan Keyboard OneNote Content Management Google Docs Law Enforcement VPN Remote Unsupported Software Processor Password Telephony Virtual Assistant Scam Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Computer Fan Going Green Windows Server 2008 Legal Wiring Data loss Sales Search Engine Software Tips Development HBO Password Manager Nanotechnology Proactive IT Managed IT Service Printers ROI Personal Wireless Charging Inventory Telecommuting Project Management Quick Tip USB FinTech Cabling Fiber Optics Password Management Social FENG Saving Time Criminal Computer Care Twitter Firewall Cortana Alert Digital Signature SharePoint Bing Messaging Outlook Business Mangement Smart Tech MSP Net Neutrality Skype Entertainment Warranty GDPR Digitize Google Apps Travel Employee Bitcoin Regulations Electronic Medical Records Wire Apple Cables Trend Micro Online Shopping Tools Work/Life Balance NIST Supply Chain Management Addiction Unified Threat Management Credit Cards Start Menu PDF HVAC Solid State Drive SMS Frequently Asked Questions Gmail Recovery File Sharing ISP OLED Using Data Printer Windows 10s Remote Computing IT Assessment Workers Downtime Batteries PCI DSS Sync Data Management Multi-Factor Security Screen Mirroring Default App Shopping Evernote Cleaning Millennials Managed Services Mobile Computing Information Technology Physical Security Virtual Machine AI Excel Recycling Devices Cryptomining Employer-Employee Relationship Biometric Security RMM YouTube Mouse Windows Server 2008 R2 OneDrive Authentication Google Search Root Cause Analysis Virtual Private Network 5G Cast IT Infrastructure Social Network Value Practices Workforce Safe Mode Security Cameras Flash Cache Policy Smart Office Manufacturing Computing The Internet of Things Amazon Specifications Shortcuts Hypervisor Hacker Tip of the week eWaste Thought Leadership Remote Worker Database Employees Microchip Public Cloud Copiers Save Time Remote Workers Trending Camera Investment Printing Charger Hosted Computing Smartwatch Peripheral HaaS Wireless Internet Procedure Document Management IP Address Managing Stress Customer Service CrashOverride Emergency Personal Information Domains Managed Service Provider Windows 10 Financial Hiring/Firing Public Speaking Presentation Fun Lithium-ion battery Tech Support Regulation Wireless Technology IBM Safety Productivity Marketing Company Culture Budget Hard Drives Customer Relationship Management Search Competition