HomeCyber BalkansManaging passkeys is becoming increasingly popular, but excessive authentication can be challenging

Managing passkeys is becoming increasingly popular, but excessive authentication can be challenging

Published on

spot_img

In the realm of cybersecurity, Keeper Security, a leading provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software, has unveiled its latest insight report titled “Navigating a Hybrid Authentication Landscape”. This report delves into the evolving strategies organizations are employing to safeguard sensitive data and identities in the face of an increasingly complex digital environment.

With the escalating threats posed to traditional password-based authentication systems by techniques such as phishing and credential stuffing, organizations are turning to innovative solutions like passkeys to fortify their security measures. Despite the effectiveness of passkeys in reducing risks associated with traditional passwords, many legacy systems still rely on passwords, resulting in the necessity for a hybrid approach that integrates both passkeys and passwords.

The insights derived from Keeper’s report, drawing from input provided by IT and security leaders across the globe, shed light on the correlation between emerging authentication technologies and the enduring relevance of passwords in securing online systems. The report offers a detailed examination of how organizations are navigating these challenges while upholding robust security protocols.

Key takeaways from the report include the widespread adoption of passkeys, with 80% of organizations either using or planning to adopt these encryption keys that authenticate users without the need for passwords. Moreover, hybrid authentication systems that combine both passwords and passkeys are prevalent, with 40% of businesses opting for this dual approach due to legacy system compatibility issues.

While passkeys have proven effective in mitigating risks, phishing remains a persistent threat, affecting 67% of organizations in hybrid authentication environments. Managing dual systems of passwords and passkeys poses a significant challenge for IT leaders, with concerns revolving around user confusion, integration complexities, and training demands associated with hybrid systems.

In response to these challenges, a majority of organizations are gradually implementing passkeys in phases, prioritizing critical systems and ensuring operational compatibility with existing password-based systems. The report underscores the importance of adopting a layered authentication approach, combining modern solutions like passkeys with strong password practices, alongside employee training, infrastructure upgrades, and seamless integration to guarantee the security and usability of authentication systems amidst ongoing digital transformations.

Darren Guccione, CEO and Co-founder of Keeper Security, emphasized the pivotal shift organizations are navigating in authentication methods, urging the adoption of comprehensive solutions within a zero-trust and zero-knowledge framework to uphold security standards in the evolving landscape. As Data Privacy Week is observed, the report serves as a timely reminder of the crucial role authentication plays in safeguarding sensitive information and the imperative for organizations to proactively adopt flexible, secure authentication methods to fend off emerging cyber threats.

For deeper insights, the full Keeper Security Insight Report can be accessed through this link. Stay ahead of the evolving cybersecurity landscape by equipping yourself with the knowledge shared in this comprehensive report.

Source link

Latest articles

Can Your Security Measures Backfire on You?

In the realm of cybersecurity, the age-old concept of breaching defenses to launch an...

Domain extension ‘.bank.in’ aims to prevent cybercrime – MSN

The Reserve Bank of India (RBI) has introduced a new initiative to combat digital...

Hackers exploit exposed ASP.NET machine keys to compromise IIS servers

Microsoft threat researchers detected a ViewState code injection attack in December 2024, revealing a...

SWE Urges Action in Response to Administrative Executive Orders

SWE Calls for Action in Response to Administrative Executive Orders In a proactive move to...

More like this

Can Your Security Measures Backfire on You?

In the realm of cybersecurity, the age-old concept of breaching defenses to launch an...

Domain extension ‘.bank.in’ aims to prevent cybercrime – MSN

The Reserve Bank of India (RBI) has introduced a new initiative to combat digital...

Hackers exploit exposed ASP.NET machine keys to compromise IIS servers

Microsoft threat researchers detected a ViewState code injection attack in December 2024, revealing a...