1 min read

Passkeys Coming to iOS 16 and MS Soon

Back in May, we heard there would soon be a successor to the password – the Passkey. 

Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited... 

...though it’s caused a bit of confusion. Apple is going to great lengths to market the Passkey, and understandably, people have assumed that it’s a feature exclusive to Apple. 

That’s not the case. 

In fact, Passkeys will be used in a joint effort to boost online security by Apple, Microsoft, and Google. The reason Apple is promoting this new feature so hard is to get the message out there.  

Microsoft and Google are also keen to spread the word so that people understand how Passkeys work.  

The more people take advantage of Passkeys, the safer our businesses are online.  

Passkeys – otherwise known as FIDO authentication – work by letting you log into an app or website with just your username and your pre-authenticated device, most probably your phone.  

Your device generates a cryptographic token, which makes the second part of a cryptographic key pair. When the pair matches, you’re allowed access to the app or website.

What that means in practice is when you’re logging in, you just use your phone to prove it's really you. You’ll just unlock it using your face, fingerprint, or PIN.

So long as your phone is within Bluetooth range of your computer it will work.

And without needing a password… bliss…

It’s a far more secure way to access apps and keep your accounts safe from cybercriminals. You never see your cryptographic token, so it takes away a lot of the danger of having your login credentials stolen.

Cybercriminals will be unable to use their normal tactics – such as phishing emails, brute force attacks, or key loggers – to steal your credentials.

They’ll need your physical device, making remote hacking much less likely.

If you use Windows Hello, you’ll see that Passkeys are already supported. And it won’t be long until all three tech giants roll out support across their entire product range.

Before then, if you’d like any help or advice on keeping your apps and accounts safer, just give us a call.

 

Published with permission from Your Tech Updates.

 

13 Strategies To Make Your Cybersecurity Failproof

13 Strategies To Make Your Cybersecurity Failproof

Skilled hackers can easily access your system and steal precious business information. Upgrading your cybersecurity can help address this problem.

Read More
What Is the Most Secure Way to Share Passwords with Employees

What Is the Most Secure Way to Share Passwords with Employees

Breached or stolen passwords are the bane of any organization’s cybersecurity. Passwords cause over80% of data breaches. Hackers get in using stolen,...

Read More
What Are the Advantages of Implementing Conditional Access?

What Are the Advantages of Implementing Conditional Access?

It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents...

Read More