Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s Been Another Step Towards Passwordless Authentication

There’s Been Another Step Towards Passwordless Authentication

While at the moment, passwords are an important part of your security stack, it is important to acknowledge that the concept of the password was always a flawed system and is overdue to be replaced. This may become a widespread reality sooner than you may expect, too, especially with the buy-in that the big names in tech are demonstrating.

Let’s consider a recent step that one of these big names recently took that shows particular promise for a passwordless future.

Enter the Passkey, and Google’s Embrace of It

The concept of a passkey is a simple one—basically, it’s another stored credential, but in this case, it is stored on the device and is exchanged with the website directly. This way, all obligations for the user to remember any credentials is eliminated.

The passkey is, on almost all counts, a superior means of authentication—and it’s all because it eliminates the need for a password text box at all. Instead of relying on the user to provide a form of authentication, passkeys are automatically generated and are inherently more secure than any user-generated form of authentication.

The trouble is, in order for passkeys to work, support for them will need to become standard. As in, every website, every browser, and every password manager will need to implement them. In addition to this, passkeys will require the user to have their phone handy and to use a Bluetooth connection to allow the phone to talk to the device in use. This localization, while helping protect your accounts, will also eliminate the capability of most desktops to utilize it.

Google, and Many Others, are Enthusiastic about Passkeys

Apple, Google, the FIDO Alliance, and Microsoft have all put their support behind the idea, with Google launching betas on both Chrome and Android, and iOS version 16 implementing it.

Google’s beta—which you can sign up for through Play Services—allows you to create passkeys on your Android devices, and passkeys are now supported in Chrome Canary, with more stable versions promised soon.

Google’s plan is to utilize its Password Manager to store these passkeys. The mobile device will have the user pick the correct account, then use a biometric proof to authenticate their identity. The phone will send over the authentication via Bluetooth, the browser sends the passkey to the website, and you’re in. Of course, if you’re actively logging in to something on your phone, the Bluetooth step is skipped.

We look forward to seeing how this technology develops and the prospect of using it as a means of potentially simplifying user authentication, without shortchanging security as a result. While there’s still some work to be done, the promise is there. In the meantime, reach out to us at 800.618.9844 to find out how we can help you manage your current cybersecurity and user authentication needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 01 May 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Small Business Cybersecurity Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management Smartphones VoIP Upgrade Managed Service communications Mobile Devices Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Automation Facebook Artificial Intelligence Productivity Covid-19 Gadgets Cloud Computing AI Server Managed Service Provider Remote Work Miscellaneous Information Outsourced IT Holiday Encryption Employee/Employer Relationship Spam Windows 10 Office Compliance Data Management Government Business Continuity Training Business Technology Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Data Security Apps App Vendor Mobile Device Management Gmail Networking Managed Services Voice over Internet Protocol Chrome BYOD Budget Employer-Employee Relationship Apple Avoiding Downtime Tip of the week Marketing Applications Computing Information Technology How To BDR Office 365 WiFi Conferencing IT Support Hacker Access Control HIPAA Website Router Operating System Retail Risk Management Managed IT Services Help Desk Analytics Office Tips Big Data Augmented Reality Healthcare Storage Password Bring Your Own Device Virtual Private Network Computers Health Solutions Going Green Document Management Cybercrime Firewall Windows 11 Scam Data loss Monitoring 2FA Excel The Internet of Things Patch Management Remote Workers Save Money Social Remote Monitoring Telephone Vulnerability End of Support Vendor Management Physical Security Cooperation Free Resource Project Management Display Customer Service Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Wireless Technology Machine Learning Employees Settings Wireless Integration Printing Content Filtering User Tip Word Modem YouTube Maintenance Mobile Security Processor Antivirus Holidays Cryptocurrency Data Storage Supply Chain Smart Technology Virtual Desktop Safety Video Conferencing Managed Services Provider Data storage LiFi Virtual Machines Saving Time Professional Services Outlook Robot Managed IT Service Money Humor Downloads iPhone IT Management Licensing VPN Meetings Customer Relationship Management Entertainment Vulnerabilities Sports Data Privacy Mouse Images 101 Computer Repair Administration Hacking Presentation Multi-Factor Authentication Telephone System Mobility Cost Management Content IT solutions Wearable Technology Websites Remote Working Memory Vendors Legal Data Breach Health IT Google Play Be Proactive Business Growth Motherboard Comparison Permissions Videos Electronic Medical Records IP Address Electronic Health Records Directions Workforce SharePoint Assessment Cortana Wasting Time Threats Writing Trend Micro Security Cameras Workplace Strategies Alt Codes Lenovo Specifications Downtime Fraud Virtual Reality Software as a Service Microchip Recovery Meta Internet Exlporer Managing Costs Amazon Username Hosted Solution Server Management Private Cloud Hard Drives Domains eCommerce SSID Typing Superfish Identity Theft Black Friday Twitter Surveillance Virtual Assistant Outsource IT Database Refrigeration Virtual Machine Environment Google Drive Media IT Technicians Knowledge Error Reviews Social Engineering Public Speaking Proxy Server Medical IT Cookies Cyber Monday Hotspot 5G Remote Computing Lithium-ion battery Development Transportation Small Businesses Tactics Hypervisor Displays Google Docs Entrepreneur Unified Communications Mirgation Experience Shopping Optimization PowerPoint Bitcoin Nanotechnology Running Cable Tablet Language Alert Employer/Employee Relationships Outsourcing Google Wallet Addiction Undo Management Navigation Managed IT Chatbots File Sharing PCI DSS Dark Data Gig Economy How To Workplace Windows 8 Screen Reader Laptop Distributed Denial of Service Service Level Agreement Computing Infrastructure Notifications Internet Service Provider Teamwork Hiring/Firing Drones Evernote Paperless Identity Travel Regulations Compliance Memes Bookmark Co-managed IT Techology Smart Tech Halloween Google Maps Download Alerts Net Neutrality Application SQL Server Technology Care History Business Communications Unified Threat Management Financial Data Break Fix Smartwatch IBM IT Browsers Scams Hacks Unified Threat Management Connectivity Scary Stories Upload Fun Procurement Azure Hybrid Work Cyber security Social Network Tech Human Resources Deep Learning Multi-Factor Security Telework Network Congestion Dark Web CES Communitications Cables User Error IoT Trends Education Supply Chain Management Competition Customer Resource management Term Google Apps Regulations Point of Sale Google Calendar FinTech Microsoft Excel IT Assessment Data Analysis IT Maintenance Mobile Computing Star Wars Gamification Network Management Staff Search Tech Support Flexibility Value Business Intelligence Monitors Shortcuts Best Practice Social Networking Legislation Organization Digital Security Cameras Smart Devices Fileless Malware User Ransmoware Buisness

Blog Archive