{"id":11370,"date":"2018-10-29T15:24:37","date_gmt":"2018-10-29T15:24:37","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=11370"},"modified":"2018-10-29T15:24:37","modified_gmt":"2018-10-29T15:24:37","slug":"five-reasons-passwords-are-here-to-stay-at-least-for-now","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/five-reasons-passwords-are-here-to-stay-at-least-for-now\/","title":{"rendered":"Five reasons passwords are here to stay (at least for now)"},"content":{"rendered":"<p>Biometric technology such as fingerprint and facial recognition have been heralded for years as a replacement for passwords. While this may be true in the distant future, there are a few challenges that have yet to be solved before they can fully replace passwords:<\/p>\n<ul>\n<li><strong>Biometrics can\u2019t be encrypted<\/strong> \u2013 biometrics is an effective gatekeeper to grant or deny access to data, but it can\u2019t be used to encrypt data. This is why even the latest phones still require passwords at setup and upon reboot.<\/li>\n<li><strong>Passwords can be updated<\/strong> \u2013 hackers have demonstrated that facial recognition can be tricked, and digital fingerprints and iris scans can be stolen. Unlike passwords, these biometric identifiers cannot be changed, making passwords and passcodes critical to how we protect and access information.<\/li>\n<li><strong>Passwords don\u2019t tie you to a device<\/strong> \u2013 using a password to log into an online account works everywhere and on any device. Biometrics cannot do the same as it is tied to a particular device. This is why apps that people frequently access from multiple devices (e.g. Netflix) always require passwords.<\/li>\n<li><strong>Biometrics present bias obstacles<\/strong> \u2013 there are serious concerns regarding whether or not some ethnicities may be disenfranchised due to facial recognition flaws. Until these concerns are adequately addressed, passwords will remain the most feasible option for identity and access management.<\/li>\n<li><strong>High-risk environments still require multifactor authentication<\/strong> \u2013 cybercriminals make a living stealing information and are becoming more sophisticated at it. More complex threat landscapes mean an increased need for multifactor authentication. In the highest-security environments, individuals must authenticate their identity multiple times per day via multiple factors.<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-11370 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='BFC FinTech Monitor 16th \u2013 23th February'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/bfc-fintech-monitor-16th-23th-february\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2021\/02\/11060-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-15820\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-15820'>\n\t\t\t\tBFC FinTech Monitor 16th \u2013 23th February\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Chatbots \u2013 customer service that boosts data security and combats fraud'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/chatbots-customer-service-that-boosts-data-security-and-combats-fraud\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2019\/11\/chatbots-customer-service-that-boosts-data-security-and-combats-fraud-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-14038\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-14038'>\n\t\t\t\tChatbots \u2013 customer service that boosts data security and combats fraud\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='How online lending will continue its evolution'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/how-online-lending-will-continue-its-evolution\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/05\/keyboard-social-business-young-person_1150-1012-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-9894\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-9894'>\n\t\t\t\tHow online lending will continue its evolution\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Biometric technology such as fingerprint and facial recognition have been heralded for years as a replacement for passwords. While this may be true in the distant future, there are a few challenges that have yet to be solved before they can fully replace passwords: Biometrics can\u2019t be encrypted \u2013 biometrics is an effective gatekeeper to &hellip;<\/p>\n","protected":false},"author":5,"featured_media":11429,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[184,206],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11370"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=11370"}],"version-history":[{"count":4,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11370\/revisions"}],"predecessor-version":[{"id":11430,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11370\/revisions\/11430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/11429"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=11370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=11370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=11370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}