The concept of “no password” authentication has attracted the attention of important industries and media. Reasons are very sufficient. Our digital life requires more and more online accounts and services, and the safety best practice requires every account and services to use a unique strong code to ensure data security. Who doesn’t want a more convenient solution?

Convenient and fast, this is the premise of the disposable password (OTP), biometric identification, PIN code, and other authentication methods as a password security. Users don’t have to remember complex passwords, you can use yourself, know or all things to verify your identity. Some examples of such authentication methods include smartphones, OTP, hardware tokens, or biometric symbols such as fingerprints. Although it sounds attractive on the surface, the problem is that as long as further exploration will find that these passwordless solutions are still dependent on the password.

This issue has two main forms:

No password solution relies on password as a backup solution

If you have an Apple device, then you may have encountered a touch ID fault at some point. TouchID authentication failed, such as button on the dirt, the user’s finger position is not right, or the system settings, etc. What tips do you see when these issues or other questions? “Please enter your password.”

This means that even if you have a touch ID to all possible applications and services, the security of these accounts is actually depends on your password. Hackers can completely ignore TouchID and directly crack your password.

In view of the problem of proliferation of password reuse, many people used by the Apple Equipment Credentials may have already leaked. Once the password is vented, rest assured, all hackers can get from the dark network.

Of course, this is not just an apple problem. These emerging authentication solutions have no longer time, and the backup authentication method is required to have future needs. When you think this second form is usually a password, there is no password, and it is difficult to touched.

Voucher is used to verify the system at the backend

A second factor in which no password illusion is generated is that some credentials are still needed to verify the system in a secure chain.

For example, you have brushed hardware token into the office, and when you are damaged or forgotten, you will switch to open your door through your unique access code. But what should I do if I need to log in to system analysis data? If they use the password without supplementary solutions to make sure that their login credentials are integrity, the security of the system still depends on password security.

Why is the password will not disappear quickly?

The above two examples have dotted that there is no password concept, which is large to be bullied, at least at least. These emerging invisible security strategies have some other authentication issues, and passwords still need to be part of authentication security in the foreseeable future.

In contrast, the password is still very attractive to the business. The password is the cheapest and scalable authentication option, so it is really difficult to replace. Passwords can be used across all devices, versions, and operating systems, there is no compatibility problem.

The emerging no password solution is different. If you want to increase compatibility, many such programs require companies to allocate more budgets. There is also another benefit of using the password for authentication: nothing is wrong. In contrast, some free password solution relies on probability decisions, there is an intrinsic error range.

The role of different levels of authentication

Erichaller, General Manager, Experie Executive Vice President, Fraud, and Data Laboratory, Expercy, Expercy, Implementation: “Consumers hope that they can identify their identities without additional steps. Today’s digital age, they are willing to accept more practical solutions.” Consumers Aspects may have this will, but the truth does not have a single, effective safety authentication solution. These invisible security policies have their own location, but only as part of the overall network security method for deploying multi-layer authentication. So, we returned to the password.

Protect cryptography security

As mentioned above, create an easy-to-remember password, and then reuse these passwords on multiple accounts and services is too common. Among a survey, 91% of respondents acknowledge that this will introduce a lot of security issues, but still 59% of respondents have done it. It is unrealistic, especially in the era of human behavior, especially in the era of human life, whether the digital interaction is much more than ever. So what should companies do to ensure password security?

Screening the importance of a stolen traile

Since the data leakage is real-time, the only method is to screen the database screening password according to the stolen truth in each login. Regardless of whether the password is used as a primary authentication method, but also the alternate authentication method when the invisible security policy is timeless, the company is necessary to continue to monitor the use of the handling license. Enzoic’s dynamic stolen voucher screening solution allows enterprise automation screening processes to ensure that resources are released, focusing on other aspects of network security without password protection.

Don’t listen to secret code hype