EconLearnerEconLearner
  • Business Insight
    • Data Analytics
    • Entrepreneurship
    • Personal Finance
    • Innovation
    • Marketing
    • Operations
    • Organizations
    • Strategy
  • Leadership & Careers
    • Careers
    • Leadership
    • Social Impact
  • Policy & The Economy
    • Economics
    • Healthcare
    • Policy
    • Politics & Elections
  • Podcast & More
    • Podcasts
    • E-Books
    • Newsletter
What's Hot

Should you ever withhold your rent? #renting #finance #podcast

June 22, 2025

Why did the Federal Reserve not caused the great recession

June 22, 2025

Indications and answers for today’s game

June 22, 2025
Facebook X (Twitter) Instagram
EconLearnerEconLearner
  • Business Insight
    • Data Analytics
    • Entrepreneurship
    • Personal Finance
    • Innovation
    • Marketing
    • Operations
    • Organizations
    • Strategy
  • Leadership & Careers
    • Careers
    • Leadership
    • Social Impact
  • Policy & The Economy
    • Economics
    • Healthcare
    • Policy
    • Politics & Elections
  • Podcast & More
    • Podcasts
    • E-Books
    • Newsletter
EconLearnerEconLearner
Home » How passwords can enhance business security
Innovation

How passwords can enhance business security

EconLearnerBy EconLearnerJuly 3, 2024No Comments6 Mins Read
How Passwords Can Enhance Business Security
Share
Facebook Twitter LinkedIn Pinterest Email

Martin Ladstaetter, Senior Vice President and Head of Identity & Access Management Solutions at HID Global.

getty

Historians believe that the first computer password was was created in 1961 by MIT computer science professor Fernando Corbató, who needed a way to manage access to a time-sharing computer. A year later, one of Corbató’s colleagues noted the first case of password theft when he print a log of these passwords and used them to increase the number of hours he could work in the system.

Since then, we’ve all become familiar with the weaknesses of passwords: hard to remember, easy to steal, and time-consuming to manage. However, few alternatives have emerged that are as simple, especially at the enterprise level. Organizations are stuck trying to improve passwords. We forced users to choose stronger passwords, made them change passwords every few months, and added multi-factor authentication. Still, we are spending considerable sums of money regarding password-related support costs. To address this, the The FIDO Alliance created one set of templates replacing passwords with secure connections backed by cryptographic credentials that can be embedded directly into almost any device. (Disclosure: HID is a member and contributor to the FIDO Alliance.)

You’ve probably encountered FIDO through the passkey, which is a password-less credential used to access a digital account. Passkeys are resistant to phishing, are widely supported by major technology manufacturers, and have seen increasing adoption in consumer applications from companies such as PayPal, Nintendo and Amazon. Passwords are now available more than 7 billion online accounts.

In this article, we will explore the importance of access keys and some critical elements of this solution to consider. But first, let’s examine how the technology works.

How passwords work

Passwords are private keys associated with a person’s device or account on a particular service or application. For passcode authentication, users unlock the device where it is stored via a user verification method (such as a PIN or biometric ID) and an encryption protocol is run in the background to prove that they still own the passkey. If successful, they are granted access.

There are two ways to store passwords:

Synchronized passwords

These are stored in cloud-based managers where they can be accessed on different devices such as smartphones, tablets or laptops. This allows users to access an account on multiple devices without re-registering each device. It also protects passwords in case the device is lost.

Device-restricted access keys

Device-bound access keys link a specific login credential to a dedicated device, such as a smart card or USB key. Before they can access an account, users must register that card or key and then be able to use it with any phone or computer they’re working on.

Passwords combine an improved user experience with a high level of security. Previously, the same technology behind passwords – public key cryptography – was associated with highly secure deployments in government agencies and highly regulated industries. Now, it is standardized and supported by major platforms and devices, making it accessible to almost everyone.

Passwords are phishing-resistant and cannot be compromised through a corporate network breach, as only public keys are stored on corporate servers. They can also be implemented in various ways depending on the need and use case.

Access Key Development: Which Format Is Best?

Beyond reducing the risk of phishing, passwords can help improve speed access to digital services. Since passwords are responsible for more than 40% for help desk calls, it is an important parameter.

Of course, flexibility brings options, which can be difficult to navigate for organizations interested in exploring passwords and wondering what’s right for them. Here are some considerations to help you make a decision.

Synchronized passwords are convenient and likely familiar to many employees from consumer domains (such as Gmail or PayPal accounts). However, as they are automatically replicated to other synced devices, this can make them difficult for higher security organizations and environments to manage. Bring your own device (BYOD) policies can further complicate matters by making it difficult for organizations to track which passwords are stored on which administrators.

Device-bound access keys provide a higher degree of protection and can increase operational efficiency in carefully designed systems. One of those options is a corporate ID for password-free access to business apps and doors. Through a single card and with a single registration, organizations can deploy passwords connected to devices that allow employees to access not only office doors, but also printers, workstations and digital applications. However, while device-linked passwords are considered more secure than synchronized passwords, they are a challenge if the device is lost or damaged, potentially locking users out of their accounts.

According to the FIDO Alliance, more than half of consumers now are familiar with passwords. However, passwords aren’t the only way businesses can benefit from asymmetric key cryptography—often called backbone of digital security. PKI certificates can also be provisioned to a wide range of devices to eliminate the need for passwords and provide a seamless experience for end users. PKI requires more careful planning and management, but it also offers capabilities beyond authentication and can be used for data encryption and digital signatures.

Password challenges to consider

As its root cause over 80% of data breaches, passwords are a big problem for businesses. Passwords are among the most convenient and widely supported alternatives, but it’s important to understand when they are (and aren’t) a good fit.

Because of the management issues described above, most businesses choose device-linked passwords. For organizations that choose to add the technology to existing corporate ID cards, the change management burden is often low. Conversely, convincing people to bring in a new device can prove more difficult. Most people, however, is interested in improving account security. Helping them understand how and why passwords fit into this goal can go a long way in improving adoption.

Device loss is one of the most common user problems. A strong backup plan—either registering and maintaining a second key or creating alternative authentication protocols to use in account recovery situations—can help mitigate risks. For example, enabling a combination of other factors, including fingerprints or facial biometrics to allow users to recover their accounts, provides the everyday convenience of passkeys with a secure backup method if the passkey should to be replaced.

Passwords and other authentication technologies will always be part of a larger security framework. Evaluate them against the security you need, the workflow that’s best for your users, and your existing IT infrastructure.

Final thoughts

Passwordless authentication has finally reached a tipping point for many as more organizations plan to reduce their reliance on passwords. As companies consider passwords to improve their security measures, it’s important to ensure an effective strategy that plans for potential challenges and better positions teams for long-term success.


Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Am I eligible?


business enhance passwords security
nguyenthomas2708
EconLearner
  • Website

Related Posts

Indications and answers for today’s game

June 22, 2025

Today’s “Wordle” #1464 tips, indications and answer for Sunday June 22nd

June 22, 2025

“Buccaneers’ season 2 crushes the score of Bridgerton’s Rotten Tomatoes

June 21, 2025

Today’s “Wordle” #1463 tips, indications and answer for Saturday 21 June

June 21, 2025
Add A Comment

Leave A Reply Cancel Reply

Personal Finance

How to Replace a 6-Figure Job You Hate With a Life That You Love

February 10, 2024

How To Build An Investment Portfolio For Retirement

February 10, 2024

What you thought you knew is hurting your money

December 6, 2023

What qualifies as an eligible HSA expense?

December 6, 2023
Latest Posts

Should you ever withhold your rent? #renting #finance #podcast

June 22, 2025

Why did the Federal Reserve not caused the great recession

June 22, 2025

Indications and answers for today’s game

June 22, 2025

Subscribe to Updates

Stay in the loop and never miss a beat!

At EconLearner, we're dedicated to equipping high school students with the fundamental knowledge they need to understand the intricacies of the economy, finance, and business. Our platform serves as a comprehensive resource, offering insightful articles, valuable content, and engaging podcasts aimed at demystifying the complex world of finance.

Facebook X (Twitter) Instagram Pinterest YouTube
Quick Links
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Main Categories
  • Business Insight
  • Leadership & Careers
  • Policy & The Economy
  • Podcast & More

Subscribe to Updates

Stay in the loop and never miss a beat!

© 2025 EconLeaners. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.