Passkeys could change passwords forever • Blisstech Solutions

Back in May, we heard there would soon be a successor to the password – the Passkey.

Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited.

Though it’s caused a bit of confusion. Apple is going to great lengths to market the Passkey, and understandably, people have assumed that it’s a feature exclusive to Apple.

That’s not the case.

In fact, Passkeys will be used in a joint effort to boost online security by Apple, Microsoft and Google. The reason Apple is promoting this new feature so hard is to get the message out there.

Microsoft and Google are also keen to spread the word so that people understand how Passkeys work.

The more people take advantage of Passkeys, the safer our businesses are online.

Passkeys – otherwise known as FIDO authentication – work by letting you log into an app or website with just your username and your pre-authenticated device, most probably your phone.

Your device generates a cryptographic token, which makes the second part of a cryptographic key pair. When the pair matches, you’re allowed access to the app or website.

What that means in practice is when you’re logging in, you just use your phone to prove its really you. You’ll just unlock it using your face, fingerprint or PIN.

So long as your phone is within Bluetooth range of your computer it will work.

And without needing a password… bliss…

It’s a far more secure way to access apps and keep your accounts safe from cyber criminals. You never see your cryptographic token, so it takes away a lot of the danger of having your login credentials stolen.

Cyber criminals will be unable to use their normal tactics – such as phishing emails, brute force attacks, or key loggers – to steal your credentials.

They’ll need your physical device, making remote hacking much less likely.

If you use Windows Hello, you’ll see that Passkeys are already supported. And it won’t be long until all three tech giants roll out support across their entire product range.

Before then, if you’d like any help or advice on keeping your apps and accounts safer, just get in touch.

https://youtu.be/FIzyPq1RNiM

More Content

A woman on a laptop with a shield and lock on the screen

Why you should use a password manager

Introduction It can be difficult to keep track of all of your online passwords, especially if you have multiple accounts for different purposes.  But did you know that there is a way to keep all of your passwords safe and secure? A password manager such as LastPass...
Unlock your potential with Copilot

Unlock your potential with Copilot

Tried Microsoft Copilot yet? It’s a smart tool baked into the applications you use every day, that could save you time. Here we tell you some cool ways it can help.

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online What is Phishing? Phishing is a common online scam in which cybercriminals try to trick you into sharing personal information, such as passwords and credit card numbers. Phishers often use email or...
Cyber security training once a year isn’t working

Cyber security training once a year isn’t working

You’re wasting your time on annual cyber security training. Why? Because it’s simply not cutting it anymore. Discover a better plan here.

Ransomware Attacks Grow for Small Businesses

Two organisations have recently released reports on the state of ransomware and cybersecurity incidents affecting small businesses. Datto's State of the Channel Ransomware Report Datto has recently released their "State of the Channel Ransomware Report"  for 2019...

Is your security focusing on the right things?

A new study shows that only a third of businesses place detection as their main priority, while two thirds say prevention is their primary focus.

Are you really downloading Zoom – or is it malware?

When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom. But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data. Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed […]

Security alert: Does your business have old logins for ex-staff?

Security Review: Does your business have old logins for ex-staff?

What’s easy to overlook but could leave your business open to cyber attacks? Unused logins. Yep, something as simple as failing to delete an old account could have serious costs for your business…

Why is my computer so slow!?

“Why is my computer so slow?” is a question heard time and time again and is one of the most common computer complaints. There are a variety of reasons that your computer can appear to be running slowly. I say ‘appear’ as it may not actually be your computer that is causing the problem. Read on to find out possible reasons for this problem.

How to use crossreferences in Word

Tech Tip: How to use cross references in Word

Today's Two Minute Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you need to refer to other places in the...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05