• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Businesses Should Not Rush Towards Going Passwordless

By kamran | At December 2, 2022

Dec 02 2022

Businesses Should Not Rush Towards Going Passwordless

Many companies nowadays are going passwordless in terms of authentication. The main reasons for this are to reduce IT expenses, try to strengthen their security, and promote the work-from-home culture. 

However, according to a statement by Espria, a managed services provider, companies should not be this eager to go passwordless. Going passwordless is a complicated process and requires a lot of consideration and attention. 

The CTO of Espria, Dave Adamson, also said that “Passwordless authentication simply replaces passwords with a more suitable authentication factor. This means moving from a centralized credential repository (where passwords are saved) to a decentralized model in which no passwords are saved, and each individual is responsible for their own passwordless authentication. Thus eliminating threats posed by passwords.”​

At one point, he also stated: “But unlike Multifactor Authentication (MFA) that does secure organizations, users often get frustrated with the additional security layer on top of having to remember their passwords. Passwordless authentication methods are more convenient because there’s no password to remember, and they’re compatible across most devices and systems.”

One more reason and benefit of organizations going passwordless is the convenience and simplicity factor. Though people manage to remember some of their passwords, some still have difficulty keeping track of them. 

According to Adamson, the CTO Espria, we need to start verifying our identities using face recognition, fingerprint, or a mobile app instead of using passwords. This will make life simpler as you don’t need to remember long passwords, and authenticating yourself is a lot easier.

The idea of a passwordless environment is brilliant, but it has some hurdles that need to be passed before executing it. A survey conducted by cyber security insiders stated that 22% of businesses in the world still don’t have passwordless verification features, and their employees still have to remember long and unique passwords. 

The possible reason for this delay is that it is still very difficult for businesses and employees to adapt to a completely passwordless environment. Many people in this survey also stated that they don’t have teams with the right skills to adopt passwordless authentication methods, which is why they don’t even consider using any. 

Adamson also stated that the interface of many websites and applications is not designed to become passwordless. Identity authentication has always been a significant problem, and developers kept this in mind while designing apps and websites. Not only this, but many organizations have multifactor authentication. In fact, many cloud service providers are providing password and authentication services.

There are plenty of websites that are recoding and redesigning their applications to make them passwordless. However, making passwordless websites is a very long process to ensure the privacy and security of confidential data. 

All in all, there is nothing wrong with going passwordless. However, this process requires a lot of consideration, time, planning, and implementation. Therefore, businesses should not rush into going passwordless. Instead, they should monitor and study all the aspects, strengthen their security system, and gradually take steps towards making their apps or websites passwordless. 

Written by kamran · Categorized: Cyber security threats, Cyber security tips

Primary Sidebar

Recents post

US Healthcare Sector Under Siege: What 2025’s Cyberattacks Reveal About Healthcare Security

From ransomware hitting … [Read More...] about US Healthcare Sector Under Siege: What 2025’s Cyberattacks Reveal About Healthcare Security

Is Your Law Firm Overlooking These 3 Critical Cyber Risks?

From juggling client deadlines … [Read More...] about Is Your Law Firm Overlooking These 3 Critical Cyber Risks?

Healthcare Cybersecurity Updates: Ransomware, Data Breaches & AI Risks

Cyberattacks targeting … [Read More...] about Healthcare Cybersecurity Updates: Ransomware, Data Breaches & AI Risks

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (25)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • US Healthcare Sector Under Siege: What 2025’s Cyberattacks Reveal About Healthcare Security
  • Is Your Law Firm Overlooking These 3 Critical Cyber Risks?
  • Healthcare Cybersecurity Updates: Ransomware, Data Breaches & AI Risks

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved