As senhas estão se tornando uma coisa do passado?

Are passwords becoming a thing of the past?

Passwords are still widely used, but they are gradually becoming less prevalent as newer, more convenient, and more secure authentication methods emerge.

Estratégia de senha

Exabeam “Backed by heavyweights including Amazon, Google and Microsoft, password elimination is gaining momentum.”

Passwords are not the only way to authenticate

Multi-factor authentication (MFA) is the practice of using more than one authentication method to verify that users are who they say they are. For example, an Internet banking access system may require customers to enter their username and password and then a code that is sent to their cell phone via text message. With this method, a hacker would have to have access to not only the credentials but also the customer's phone to access their account.

Here are some other authentication methods currently employed. As they are used more, passwords will be used less and less. The following video also describes some of them:

Biometry

Biometrics are physical attributes that uniquely identify individuals. Because we always have them with us, they are easy to use.

  • Fingerprints. No two people have the same fingerprint, so this method can definitively verify an individual's identity. An example of this technology is the iPhone 5S, which includes Touch ID as a verification option.
  • Facial recognition. Devices like the Google Pixel smartphone include facial recognition as a verification option. Instead of entering a complicated code or pattern, the user can simply pick up the phone and point it at their face to gain access.
  • Iris recognition. Iris recognition is similar to facial recognition, but uses only the iris of the eye to verify identity.

Push notifications

Similar to a passcode, push notification (also known as “magic link”) authentication requires access to a specific mobile device or email account. When a user requests access to a website, they receive a link via text message or email and must activate the link to gain access. Typically, the link expires after being used or after a certain period of time.

Security keys

Hardware security keys connect to hardware devices using USB, USB-A, USB-C, NFC, and Bluetooth technology. Some of these include fingerprint authentication for users who want biometric identification for devices that don't use it. Security keys are small enough to carry anywhere and most of them can be attached to a key chain.

Hardware security modules

Hardware security modules (HSMs) are physical devices that serve specific applications. They come in different formats, including integrated PCI Express cards, Ethernet-connected devices, and USB-connected devices. They enable cryptographic operations and protect cryptographic keys.

Consider password alternatives

If your company requires passwords to access internal systems, remember that managing passwords, not to mention recovering passwords if one is forgotten, takes up time that your employees could be spending on more valuable tasks. This time can reach dozens or even hundreds of hours per year if multiplied across your entire workforce. Imagine the research, planning and innovation that could be done during this time.

Additionally, if your company develops apps or software for customers, using passwords can promote a negative customer experience (CX), which can contribute to lost loyalty, business, and revenue. Given these important factors, business leaders should begin to consider what other methods might make more sense for employees and customers to use as passwords increasingly become a thing of the past.

Source: BairesDev

Back to blog

Leave a comment

Please note, comments need to be approved before they are published.