The Death of the Password Is Upon Us

Technology has afforded consumers terrific conveniences, and with that, consumer patience has gradually dwindled. We now expect frictionless, real-time access to information, applications and networks. In light of the emphasis on convenience and the consumer experience, the traditional password is losing its foothold as the standard in authentication.

Consumers no longer have the patience to fill out lengthy registration forms, or the free brain space to remember dozens upon dozens of usernames and passwords.  In fact, a recent survey by Gigya found that 52 per cent of consumers would choose anything but a traditional username and password account registration when given the option.

Traditional passwords also invite trouble, as evidenced by the many reported instances of ID theft, which was found to have accounted for almost half of all fraud in the first quarter of 2015. Security risk is now a top factor driving consumers’ identity authentication preferences, with 26 per cent of our respondents also having had an online account compromised in the past 12 months.

Yet, the opportunity exists for brands to finally put the password out of its misery and drive the convergence of security and customer experience. They can do this by supporting advanced methods of identifying and authenticating users.

Mobile, social helping push popularity of advanced authentication techniques

With their reputation for bridging the security-consumer experience chasm, advanced authentication techniques have piqued the public’s interest. Consumers are increasingly opting to authenticate their identities on digital properties using their existing social credentials (like Facebook, Twitter and PayPal). They’re also becoming more comfortable with biometric and multifactor authentication. Biometrics requires the user to log in to a device using a fingerprint, voice, iris or now even an ear. Multifactor authentication requires information that, theoretically, only the user would know or possess: a knowledge factor (piece of information like where you were born), a possession factor (such as a token), or an inherence factor (fingerprint, etc.).

Our research also found that 80 per cent of consumers believe biometric authentication is more secure than traditional usernames and passwords. This year, the advanced authentication trend is expected to gain even more momentum, which may accelerate the traditional password’s death.

The growing interest in advanced authentication techniques is spurred by a number of drivers, including the availability of mobile phone-based biometric technologies, social login and mobile payment. In fact, research conducted by ESG shows that 41 per cent of enterprises are already using mobile devices for multifactor authentication. Another 44 per cent are or would consider using social login/identity credentials for authentication.

Surviving and thriving amid convergence of security, customer experience

The imminent fall of passwords and the corresponding rise of advanced authentication techniques means brands must refactor and re-implement their legacy identity and access management systems to support new types of credentials.

The added benefit in this move is that the user experience not only becomes more secure by virtue of advanced authentication, but also becomes frictionless and personalised. Certainly, logging in using a social identity or biometric factor is much less invasive and off-putting than having to come up with another password, or reveal at length (again) the user’s name, address, preferences and so forth at the time of registration.

While the traditional password is dying a slow death, the advent of biometrics and other advanced authentication technologies is quickly taking over. Savvy brands understand that advanced authentication affords stronger security, but not at the expense of the customer experience. Their next step is to embrace technologies that support advanced authentication, which will ultimately draw new customers looking for a secure, seamless and personalised user experience.

Informationsecurity:

« Son Of Stuxnet: Irongate Malware
FTSE Company Boards Struggle with Cybersecurity Management »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Blackpanda

Blackpanda

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

Chorus

Chorus

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.