Mytek Logo
MyTek Logo

Will We Soon Leave Passwords Behind?

by | Aug 28, 2020 | MyTek Blog, Technology


Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

More than 80 percent of cyberattacks are all because of one common variable. Do you have any guesses of what that might be? If you were to guess “stolen access credentials” then you would be absolutely correct. But luckily, the traditional username and password combination may soon be a thing of the past because more and more tech companies are transitioning to different authentication measures. One example of passwordless authentication use is Microsoft.

But First… What is Passwordless Authentication?

Passwordless authentication is exactly what it sounds like it is. Instead of using a predetermined passcode, this type of authentication uses different methods. These other measures might be verification applications, security tokens, biometrics or authentication through another service or application.

Did you know you’ve probably already used passwordless authentication? If your phone unlocks with just a recognition of your face or fingerprint, you have. How about receiving a code through text message or email? Some of these methods aren’t as secure as others, but they all at least avoid the weakness that passwords bring along. Here are a few of the major weaknesses these authentication methods can avoid by avoiding passwords:

  • Brute force attempts are simpler for cybercriminals since passwords harbor insufficient strength
  • Users can’t reuse their same passwords across different accounts and applications
  • Passwords are the only way hackers can use brute force

The Benefits of Passwordless Authentication

Cost Efficacy

Forrester Research says that password resets cause businesses around $70 each. If there are no passwords to reset, that money is saved.

Improved Convenience in the User Experience

Instead of expecting your employees to remember all of their “unique” and secure passwords, they won’t have to anymore. This expectation often leads people to reuse their passwords, which makes them way less secure, if they are secure at all. This type of authentication takes this pressure away and adds less stress to your team while keeping your business safe.


Passwordless authentication, if it’s not already clear, is safer and more secure than other forms of authentication. This is why Microsoft is working on ways to incorporate this technology.

What Microsoft is Doing

150 million consumer and enterprise accounts are using it, and up to 90 percent of their own 150 thousand employees are using it too. They did this by pairing this authentication with multi-factor authentication as well.

Do you need help incorporating these methods? Mytek knows exactly how to make that possible so give us a call at 623-312-2440 today.


Tim - Team

Tim Tiller, LMSW

Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.


Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.


Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Share This