{"id":11370,"date":"2018-10-29T15:24:37","date_gmt":"2018-10-29T15:24:37","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=11370"},"modified":"2018-10-29T15:24:37","modified_gmt":"2018-10-29T15:24:37","slug":"five-reasons-passwords-are-here-to-stay-at-least-for-now","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/five-reasons-passwords-are-here-to-stay-at-least-for-now\/","title":{"rendered":"Five reasons passwords are here to stay (at least for now)"},"content":{"rendered":"<p>Biometric technology such as fingerprint and facial recognition have been heralded for years as a replacement for passwords. While this may be true in the distant future, there are a few challenges that have yet to be solved before they can fully replace passwords:<\/p>\n<ul>\n<li><strong>Biometrics can\u2019t be encrypted<\/strong> \u2013 biometrics is an effective gatekeeper to grant or deny access to data, but it can\u2019t be used to encrypt data. This is why even the latest phones still require passwords at setup and upon reboot.<\/li>\n<li><strong>Passwords can be updated<\/strong> \u2013 hackers have demonstrated that facial recognition can be tricked, and digital fingerprints and iris scans can be stolen. Unlike passwords, these biometric identifiers cannot be changed, making passwords and passcodes critical to how we protect and access information.<\/li>\n<li><strong>Passwords don\u2019t tie you to a device<\/strong> \u2013 using a password to log into an online account works everywhere and on any device. Biometrics cannot do the same as it is tied to a particular device. This is why apps that people frequently access from multiple devices (e.g. Netflix) always require passwords.<\/li>\n<li><strong>Biometrics present bias obstacles<\/strong> \u2013 there are serious concerns regarding whether or not some ethnicities may be disenfranchised due to facial recognition flaws. Until these concerns are adequately addressed, passwords will remain the most feasible option for identity and access management.<\/li>\n<li><strong>High-risk environments still require multifactor authentication<\/strong> \u2013 cybercriminals make a living stealing information and are becoming more sophisticated at it. More complex threat landscapes mean an increased need for multifactor authentication. In the highest-security environments, individuals must authenticate their identity multiple times per day via multiple factors.<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-11370 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='Global Fintech Fest Report Highlights'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/global-fintech-fest-report-highlights\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2023\/09\/c7bcb5fd-3e5e-49a6-6731-5ff8e10b3f3d1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-17315\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-17315'>\n\t\t\t\tGlobal Fintech Fest Report Highlights\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Central Bank of Russia considering developing a digital ruble'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/central-bank-of-russia-considering-developing-a-digital-ruble\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2020\/10\/d15f6df8-e857-42e6-ab1f-047be532f1291-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-15430\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-15430'>\n\t\t\t\tCentral Bank of Russia considering developing a digital ruble\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='The inside-out approach to cybersecurity in banking'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/the-inside-out-approach-to-cybersecurity-in-banking\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/11\/the-inside-out-approach-to-cybersecurity-in-banking-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11458\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11458'>\n\t\t\t\tThe inside-out approach to cybersecurity in banking\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Biometric technology such as fingerprint and facial recognition have been heralded for years as a replacement for passwords. While this may be true in the distant future, there are a few challenges that have yet to be solved before they can fully replace passwords: Biometrics can\u2019t be encrypted \u2013 biometrics is an effective gatekeeper to &hellip;<\/p>\n","protected":false},"author":5,"featured_media":11429,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[184,206],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11370"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=11370"}],"version-history":[{"count":4,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11370\/revisions"}],"predecessor-version":[{"id":11430,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11370\/revisions\/11430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/11429"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=11370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=11370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=11370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}