Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    All Star Fox games that the new Star Fox game is technically a remake of

    May 7, 2026

    Our Land review – superb doc on the right to roam

    May 7, 2026

    Mercedes-Maybach Boss: Buyers Want V12 Engines

    May 7, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Passwordless authentication isn’t the problem, the myths around the technology are
    Passwordless authentication isn’t the problem, the myths around the technology are
    Tech Reviews

    Passwordless authentication isn’t the problem, the myths around the technology are

    gvfx00@gmail.comBy gvfx00@gmail.comDecember 3, 2025No Comments5 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Most online applications today require a password. According to recent research, the average person must juggle 168 passwords.

    For many online users, remembering and resetting these is a recurring annoyance.

    So, while passwords have become the norm, they’re neither the most secure nor the most practical option.


    You may like

    Martin Lee

    Social Links Navigation

    Martin Lee is Technical Lead, Security Research for EMEA at Cisco Talos.

    The reality is that passwords don’t last as long as they used to and they have become easy for adversaries to subvert.

    Password fatigue means many users often reuse and recycle their passwords, typically making small changes to already weak credentials.

    This leaves online users vulnerable to password-related attacks, such as credential stuffing, phishing or push-bombing attacks.

    Thankfully, a better alternative exists: passwordless authentication. Passwordless lets you prove who you are without typing a password. Instead, it uses methods such as your fingerprint, face, or a security key on a device.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Not only does that ease the sign-in process, but it also makes it more difficult for attackers to fake. Despite its benefits, however, myths about passwordless authentication continue to persist.

    Table of Contents

    Toggle
    • Replacing myths with facts
    • A password is not a pin
    • Passwords safer than biometrics?
    • Passwordless: the key to frictionless sign-in experience
      • Related posts:
    • Today's NYT Connections: Sports Edition Hints, Answers for Feb. 9 #504
    • The Philips Hue app can now customize lighting scenes so they suit the layout of your rooms
    • AI animation studio Toonstar will turn books into digital shows for HarperCollins

    Replacing myths with facts

    The first common myth about a passwordless approach is the assumption that it is less secure than multi-factor authentication (MFA).

    Many believe doing away with a password means skipping an important layer of protection. In reality, a passwordless approach is MFA, but in a slightly different way.


    You may like

    Traditional MFA relies on something you have, such as a mobile device, and something you know, like a password. Passwordless authentication combines the ‘something you know’ element with something you are, for example facial recognition or your biometric.

    Removing the need for a password results in a frictionless login experience, and significantly reduces risks for users, and for the platforms and enterprise applications they are accessing.

    It makes it nearly impossible for attackers to steal or fake a login, as they’d need to guess the correct pin and also have access to biometric data.

    A secondary benefit of passwordless authentication is also the reduced burden on IT teams to resolve password-related incidents.

    Considering U.S. based organizations allocate over $1 million for password-related support costs, adopting passwordless authentication could see significant time and budget freed up for more complex projects.

    A password is not a pin

    Another common myth about passwordless authentication is that a pin can have the same points of security failure as a password. That’s not true. A pin may look like a password, but it doesn’t work in the same way.

    Password data is typically sent over the internet and often stored on a company server, exposing user credentials to external adversaries.

    On the other hand, a pin is used to unlock a device locally meaning there is nothing for attackers to access remotely. Not only would an attacker have to physically possess a device to even attempt to access it, but even if a device is stolen, a pin can only be entered incorrectly so many times before the device is locked.

    This makes pin access far more secure than passwords, and combined with biometric data, users can feel confident that their device is very unlikely to be compromised.

    Passwords safer than biometrics?

    A third common myth is the idea that passwords are inherently safer than biometrics. This myth was borne out of the early days of biometrics, when the technology was still in its infancy and headlines reported devices being fooled by fake faces or fingerprints.

    Thankfully, those days are behind us, and many of the flaws associated with biometrics have been resolved. Today’s systems use features such as 3D mapping, infrared light and “liveness” detection to make spoofing extremely difficult.

    Much like a pin, biometrics work locally. When a user attempts to authenticate via biometrics, they unlock a private key stored on a device. That key never leaves the device it is stored on, and nor can it be transferred to another device or site.

    This makes biometric safe from remote access and attacks, and means attackers would have to possess a device and coerce its owner into unlocking it to access any data.

    Passwordless: the key to frictionless sign-in experience

    As with every new technology cycle or advancement, passwordless authentication is subject to myths and skepticism. For many organizations, passwordless is an important building block towards a zero-trust security strategy.

    It can help organizations, both big and small, establish a single, strong user identity and trust, and can significantly transform the sign-in experience for customers.

    But adopting passwordless authentication doesn’t happen overnight, and while the promise of better user experience, reduced IT time and cost, and stronger security posture seem like the ideal trifecta, organizations need to think carefully about how it is implemented.

    Establishing a clear understanding of an organisation’s application landscape is an important starting point—thinking about which applications need protecting. This will help IT and security teams define the pre-requisites to get towards a fully fledged zero-trust strategy.

    From there, IT teams should think about adopting a piecemeal approach with pilot deployments of passwordless authentication that can help iron out early issues, and address any user concerns.

    Passwordless isn’t just a new, easier way to log-in, it has the ability to transform an organization’s security credentials and its journey towards zero-trust. Taking the passwordless plunge is the first step towards the future of authentication.

    We’ve featured the best private browser.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    Related posts:

    Windows 11 on an Intel-based Mac: The Quick Guide and Cool ISO Downloads

    'Marshals' Release Schedule: When Episode 7 Hits Paramount Plus

    Millions of people imperiled through sign-in links sent by SMS

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleOctopath Traveler 0 Review – From Zero To Heroes
    Next Article Top AI Blogs and Websites To Follow in 2024
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    A Star Fox Remake Is Heading To Switch 2 On June 25

    May 6, 2026
    Tech Reviews

    World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage

    May 6, 2026
    Tech Reviews

    12+ compact accessories that’ll turn your phone into the perfect video and photo tool for travel — from $10 / £10

    May 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.