Contact us today!

FRS Pros Blog

Will We Soon Leave Passwords Behind?

Will We Soon Leave Passwords Behind?

If I were to tell you that one variable was responsible for more than 80 percent of cyberattacks, what would you guess that variable was? If you guessed “stolen access credentials,” you’d be correct. The traditional username/password combination may soon be a thing of the past as more tech companies transition to alternative authentication measures.

Take, for instance, Microsoft.

But First… What is Passwordless Authentication?

Passwordless authentication is precisely what it sounds like. Instead of requiring a person to authenticate their identity by inputting a predetermined passcode, passwordless authentication looks to other measures to confirm validity. Does the user have access to a verification application? Do they possess a security token? Do their biometrics match the reference data? Have they already been authenticated by another service or application?

If your phone unlocks when it recognizes your face or fingerprint, you’ve used passwordless authentication before, or if you’ve received an access code via text message or email. While not all forms of passwordless authentication are equally secure, they generally resist the weaknesses that the traditional password is prone to:

  • Insufficient strength, making brute-force attempts much simpler for cybercriminals
  • Without a password, users cannot reuse passwords across different accounts
  • Brute force attacks require a password to be present to work, which passwordless authentication negates

The Benefits of Passwordless Authentication

Cost Efficacy

Passwords can be shockingly expensive to maintain. Forrester Research has estimated that each password reset costs the company $70, finding that large organizations spent $1 million in staffing and infrastructure alone to handle them in 2018. However, if there is no password to reset, there will be no cost associated with resetting it.

Improved Convenience in the User Experience

When the average user nowadays is expected to remember literally dozens of passwords, there’s little wonder that so many users resort to just picking one and recycling it over and over. From the user’s perspective, it’s more convenient, which means they can access what they need and get down to business more efficiently.

Of course, this doesn’t encompass the full reality of the situation. Therefore, to ensure that your security is maintained, it makes sense to make the most secure option the most convenient one as well. Passwordless authentication removes all the pressure of remembering all those credentials. As a result, your employees will both be under less stress and in a position to securely work towards your organizational goals.


Finally, and most crucially, passwordless authentication is safer. Think about it: cybercriminals are targeting the human element more and more frequently as they leverage their attacks. Phishing is a common means for a cybercriminal to gain access to your business’ data, and there are plenty of other attacks that target your authentication measures anyways, like credential stuffing and brute force attacks. Each of these attacks relies on a set, concrete password being the key to the castle, so passwordless authentication measures can minimize the threat they pose.

Reasons like these are why Microsoft is putting so much effort into passwordless technologies.

What Microsoft is Doing with Passwordless Authentication

In no uncertain terms, quite a bit.

In addition to 150 million consumer and enterprise accounts using passwordless authentication measures as of May 2020, Microsoft itself has effectively made an internal transition to passwordless. Up to 90 percent of their own 150 thousand employees have opted into passwordless authentications—saving Microsoft 80 percent of the support costs that once went to internal password management. Microsoft has accomplished this by pairing passwordless measures with secure multi-factor authentication.

Their strategy now can be summed up as saying, “Okay, so this user appears to be who they’re supposed to be. Let’s make sure they have something that they’re supposed to have.”

In doing so, Microsoft has also seen an uptick in MFA adoption, reinforcing security without adding any unexpected inconvenience to the user.

So, if passwordless authentication is truly…

  • More secure
  • More affordable
  • More user-friendly
  • More manageable
  • And more convenient

…it only makes sense that businesses of all sizes will soon see increased availability of these solutions and have a greater motivation to use them. As a result, we can confidently say that we foresee a passwordless future on the horizon.

Regardless of how security is enforced, FRS Pros is here to assist you in enforcing it. Reach out to us today to learn how we can help make your operations more secure and productive with our IT services and solutions. Call 561-795-2000 now.

New Cyberattack Targeting Remote Workers
Are Breaks During the Workday all that Helpful?

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Hackers User Tips Software Cloud Google Microsoft Innovation Hardware Efficiency Data Business Management Hosted Solutions Email Computer Communication Windows 10 Malware Tech Term Smartphones Cybersecurity Data Backup IT Support Workplace Tips IT Services Android Mobile Devices Business Small Business Smartphone Browser Backup Disaster Recovery Upgrade Outsourced IT VoIP Data Recovery Office 365 Collaboration Users Gadgets Phishing Information Internet of Things Communications Windows Apps Cloud Computing Ransomware Data Security Network Cybercrime Business Continuity Miscellaneous Saving Money Operating System Managed IT Services Covid-19 Automation Passwords Social Media Managed Service Facebook Quick Tips Wireless Mobile Device Management Microsoft Office Health Employer-Employee Relationship Server Money Blockchain Vulnerability Artificial Intelligence Two-factor Authentication Alert OneNote Law Enforcement Networking IT Support Virtualization Conferencing Managed IT Applications Chrome Spam Mobile Office Best Practice Holiday Managed IT Services Information Technology Mobile Device Wi-Fi Retail Save Money Access Control Computers Printing Word Bring Your Own Device Managed Service Provider Router Patch Management Project Management Unsupported Software Augmented Reality BYOD Google Drive Settings Telephone Systems Data Breach Tech Support App Windows 7 Password Data Storage Hacking WiFi Bandwidth Windows 10 Gmail The Internet of Things Management Update VPN iPhone Cortana Audit Meetings Politics Data Loss Data Protection Shortcut History Budget Mobile Security Wireless Technology Vendor BDR Wireless Charging Cost Management Google Assistant Google Docs Data Management IT Management Hosted Solution Devices Marketing Hybrid Cloud Commerce Search Paperless Office Productivity WannaCry Voice over Internet Protocol Avoiding Downtime Mobility Sports Application Encryption Remote Travel Telephony Safety HIPAA Business Technology Excel SaaS Going Green Social File Sharing Software as a Service Proactive IT Battery Hard Drive Display Government Apple Fraud Remote Workers Touchscreen Human Resources Risk Management Evernote Robot User Error Payment Cards Identity Theft Personal Information Managed IT Service Remote Working NFL eWaste Financial Screen Mirroring Payroll Investment Net Neutrality Websites Computer Care Nanotechnology Camera Myths Procedure DDoS Unified Threat Management Sabotage Troubleshooting Identities Files Employees Office Charger Recovery Telephone Reputation Copiers Ciminal Disaster Solid State Drive Employee Business Intelligence Solutions Projects Vendor Management Managed Services Provider Device Security Emails Cast Security Cameras Data storage ROI Internet Service Provider Data Theft Root Cause Analysis Threats Video Conferencing Adobe Workers Upgrades PowerPoint Admin Remote Computing PC CRM Legislation Language Computer Fan OneDrive Scam Administrator Hyperlink Inventory Hard Disk Drive Compliance Education Break/Fix Digital Signage Printer Identity Printers Samsung Facebook Privacy Windows Ink Lithium-ion battery Machine Learning Windows Server 2008 R2 Gifts Computing Streaming Media Scams Organization Licensing Updates Wireless Internet Saving Time AI Comparison Employee-Employer Relationship Outlook Access Value Legal Wasting Time Transportation Microsoft Excel IT budget IT Solutions Medical IT Laptop Firewall PCI DSS Data Privacy Antivirus Private Cloud eCommerce Google Maps Spyware Webinar Amazon Downtime Workstation Credit Cards App store Chromecast Virtual Private Network Microsoft Word Consultant Gamification Keyboard Shortcuts Smartwatch Specifications Virus Training Regulations Compliance Internet Exlporer Remote Monitoring Accessory Hosted Desktop 5G Touchpad Processor Fiber Optics IT solutions Virtual Assistant Instant Messaging E-Commerce Hacker Development Telework Innovations Tablets Maintenance Uninterrupted Power Supply Memory Emergency Server Maintenance Remote Work Sales Proactive Testing Benchmarks Policy Sync Computer Forensics Peripheral Smart Devices Storage Social Engineering iOS WIndows Server 2008 Point of Sale YouTube Humor FAQ Chromebook Co-Managed Services Entertainment Holidays Edge Windows 10s Alexa for Business HBO Keyboard Micrsosoft Audits Black Market Cleaning Big Data Automobile Managing Stress PDF Mobile Computing USB Worker How To Books Video Games Experience Hiring/Firing Text Messaging Work/Life Balance Virtual Reality Thank You Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Cache Phone System Communitications Regulation Benefits Office tips Save Time Advertising Congratulations Monitors Computer Accessories es Twitter Flexibility Music Smart Technology Television CrashOverride HaaS End of Support Company Culture Scalability Analytics Relocation