The average person now has over 100 accounts that require some form of authentication. These range from relatively innocuous profiles to mission
critical financial accounts. The challenge, therefore, is as urgent as it is
difficult: how can we institute better authentication techniques that can be
applied across a wide range of assets?
In this article we’ll review pros and cons of the most popular authentication strategies along with some of the latest emerging solutions.
Step 1: Choosing an Authentication Technique
Nearly all authentication that takes place nowadays can be grouped into one of three categories: what you know, what you are, and what you have. Let’s start with the first and work our way down the list.
Which form of authentication you choose should depend on your particular use case and needs. This decision should never be made solely
on a compliance basis but rather should be crafted to respond to your
individual risks, strategic requirements, and physical contexts. Balancing
security and usability will be the key consideration here. Contrary to popular opinion, there is such a thing as too much security.
At SharePass, we recommend implementing multi-factor authentication across two different categories. This often takes the form of a traditional password plus an OTP code linked to your phone or email. However, as hackers have demonstrated a capability to circumvent OTPs via phishing
campaigns and the like, many mobile applications now prefer some form of biometric data such as fingerprint or facial recognition. Again, it is
important to consider the needs of the end users, developers, and business units before making any final decisions. For sensitive applications, consulting with an external security partner is highly recommended.
Step 2: Sharing Your Authentication
Say that you’d like to allow a family member to sign into your email account, but don’t want to tell them your password. Or perhaps a client requires single use access to a particular business application, and you
don’t want to change your password after. There are several ways to share
account access without handing over any credentials, devices, or biometric
data. However, as we’ll see, each of these methods incurs a certain security
risk and is therefore not recommended for general use.
Step 3: Managing Your Authentication
With passwords here to stay for the near future, password management has become the keystone of authentication security. Unfortunately,
once you’ve centralized all of your passwords in one place, that becomes a
prime target for malicious actors. It’s therefore critical that your password
manager is employing the highest security standards, both during development and in their choice of authentication method. SharePass recommends employing all three encryption types (credentials, OTP, and biometric) to limit your risk as much as possible.
At SharePass, we’ve gone one step further and developed a pioneering zero-trust Passwordless solution which shields passwords even from
logged in users. Instead, it relies on “mutual authentication” which will alert
both sender and receiver of potential access to the data, preventing a breach even if someone gains access to your account.
Unlike other services, SharePass leverages a patent pending security funnel system to ensure that passwords are unbreakable, even by us.
Moreover, our ACID-compliant databases provide an all-or-nothing approach to data transactions thereby protecting users from any rare event which might impact data confidentiality, integrity, or availability.
Don't risk it, SharePass it!
To learn more about SharePass or sign up for a free trial, visit https://sharepass.com/