FIDO’s Passwordless Sign-Ins
Secure your business with CyberHoot Today!!! Sign Up Now In early May 2022, Google, Apple, and Microsoft announced plans to support a common passwordless sign-in standard created by the Fast ...

Or login with email
Join our subscribers list to get the latest news, updates and special offers directly in your inbox
In early May 2022, Google, Apple, and Microsoft announced plans to support a common passwordless sign-in standard created by the Fast Identity Online (FIDO) Alliance and the World Wide Web Consortium. Moving away from passwords is something CyberHoot has also embraced. We forgo a Password login, to a special link being sent to your email (somewhere you log into each day).
Going passwordless will allow organizations to offer consistent, secure, and easy passwordless sign-ins to consumers across devices and platforms. FIDO says:
“The expanded standards-based capabilities will give websites and apps the ability to offer an end-to-end passwordless option. Users will sign in through the same action that they take multiple times each day to unlock their devices, such as a simple verification of their fingerprint or face, or a device PIN. This new approach protects against phishing and sign-in will be radically more secure when compared to passwords and legacy multi-factor technologies such as one-time passcodes sent over SMS.”
It is well known in the cybersecurity industry that password-only authentication can be a large security risk to individuals and companies. For end-users, managing so many passwords with so many different sites can be nearly impossible. It most often results in the reuse of the same password across multiple accounts (which is why CyberHoot recommends using Password Managers).
FIDO noted that password managers and Two-Factor Authentication (2FA) work well, but there has been industry-wide collaboration to create sign-in technology that is more convenient and more secure. CyberHoot often witnesses that many fail to set up strong passwords for their Password Managers or users forget or refuse to enable 2FA on critical accounts because they think it’s inconvenient. So this FIDO initiative could be a boon to overall SMB cybersecurity.
FIDO announced that this new passwordless tool will provide the following capabilities in the future:
While it would be awesome to have one “passkey” as described above, we may still be years away from this becoming a common thing. Craig Lurey, CTO and Co-Founder of Keeper Security, discusses challenges with adoption:
The slow adoption of multi-factor authentication by businesses and consumers—despite MFA being a practical and highly effective way to protect end users from breaches due to credential theft—is a good indicator of the possible adoption timeframe for passwordless tech.
First, vendors have to build the technology into their websites and applications, and then, end users have to be educated about the technology and come to trust and adopt it. Note that this includes users becoming accustomed to relying on their mobile devices.
Between both organizational and consumer adoption, it may take many years until passwordless tech is widespread. Bottom line: We’ll still be using passwords for at least another decade. Single-factor, passwordless login has too many functional, logistical and security issues to become the norm overnight.
This means that you should continue following CyberHoot’s recommendations regarding cybersecurity and authentication processes until the passwordless option is available and well-tested. Until then, require 14 character, non-complex, and non-expiring passwords, stored in a password manager. To this, you want to add multi-factor authentication (MFA) to all critical accounts. Train employees on the merits of strong password hygiene and their password manager. It’s that easy. Beyond passwords, CyberHoot recommends the following minimum essential cybersecurity recommendations.
The following recommendations will help you and your business stay secure with the various threats you may face on a day-to-day basis. All of the suggestions listed below can be gained by hiring CyberHoot’s vCISO Program development services.
Each of these recommendations, except cyber-insurance, is built into CyberHoot’s product and virtual Chief Information Security Officer services. With CyberHoot you can govern, train, assess, and test your employees. Visit CyberHoot.com and sign up for our services today. At the very least continue to learn by enrolling in our monthly Cybersecurity newsletters to stay on top of current cybersecurity updates.
hackeridiot Nov 11, 2021 0 13
hackeridiot Nov 3, 2022 0 12
hackeridiot Oct 23, 2022 0 5
hackeridiot Jan 27, 2022 0 313
hackeridiot Nov 11, 2021 0 509
hackeridiot Oct 31, 2021 0 147
hackeridiot Oct 24, 2022 0 8
Microsoft Corp. is investigating reports that attackers are exploiting two previously...
hackeridiot May 5, 2023 0 2
Striker is a simple Command and Control (C2) program. Disclaimer This project is...
hackeridiot May 5, 2023 0 7
This is a powershell reverse shell that executes the commands and or scripts that...
hackeridiot Jun 25, 2022 0 12
Revolution Market has Forced 2FA, XMR, BTC, a little bit of multisig and the best...
hackeridiot Oct 12, 2022 0 8
While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud...
hackeridiot Oct 24, 2022 0 4
On October 10, 2022, there were 576,562 LinkedIn accounts that listed their current...
hackeridiot Jun 30, 2022 0 29
Mega Darknet Market is a new market developed in Russia. Mega Darknet Market currently...
hackeridiot May 5, 2023 0 3
In an exclusive interview with Cointelegraph, Alluvial chief product officer Matt...
hackeridiot Oct 12, 2022 0 12
Tor Market is a simple darknet market made to make trading less risky than using...
hackeridiot May 5, 2023 0 3
The judge said he read all the papers and declarations related to the FTX debtors’...
Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.