Passwords To Be Phased Out By 2025, Say InfoSec ProsPasswords To Be Phased Out By 2025, Say InfoSec Pros
Behavioral biometrics technology and two-factor authentication are on the rise as safer alternatives, according to a study.
June 30, 2016
A study of 600 security professionals by mobile ID provider TeleSign has revealed that customer account protection is a major worry for businesses, with 72% of those interviewed saying passwords will be phased out by 2025. More and more companies, says the report, are replacing passwords with behavioral biometrics and two-factor authentication (2FA) with 92% of security experts claiming this will enhance account security considerably.
“The vast majority of security professionals no longer trust the password to do its job,” said Ryan Disraeli of TeleSign because 69% of the respondents said they did not think usernames and passwords provided enough security. Account takeovers (ATOs) were a huge concern for 79% even as 86% worried about ID authentication of web and mobile app users with 90% having been hit by online frauds in the last year.
More than half (54%) of the organizations say they will move to behavioral biometrics in 2016 or later whereas 85% said they would implement 2FA within the next 12 months. Eight out of the 10 respondents believe behavioral biometrics will not degrade user experience.
Read the full survey here.
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
The Rise of Extended Detection & Response