Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Finally! Ways to Log In Without Passwords
Facebook   X   LinkedIn   Email

Finally! Ways to Log In Without Passwords

June 24, 2024

The time has come. Technology has finally appeared that all but eliminates the need to remember a whole bunch of different passwords. No more hint lists. No more trying to come up with yet another one for each site you use. All of that has finally become unnecessary, mostly. Now, you can use some other way to log in. Whew!

You’ve probably seen something on websites you log into that give you an option as to how you want to log in. Maybe it asks if you want to use a security key, your face ID, or a keychain. What you choose depends largely on your preference, your device, or on how you are logging in. For example, if you don't have face or fingerprint authentication on the device, well, you obviously can't choose that. The password and MFA combination is still a great way to do it, however, but you have options.

Passkeys: These take us one step further than traditional passwords. They use two-factor authentication and biometric verification. This is usually a login ID and a biometric ID, such as Face ID or fingerprint, to secure accounts. No one has your face or fingerprint, so this is a great option.

One-time passwords: The website will send you a one-time, unique password via text or email (for example). Once you use it, it won’t work again.

Hardware keys: These are tiny “keys” that you can plug into your computer or mobile device to authenticate to your accounts. They are compatible with USB-A, USB-C, Bluetooth, and NFC connections and are lightweight and very small. You can use them with many accounts such as Facebook, Gmail, Yahoo Mail, Dropbox, Amazon, and SalesForce, to name a few.

However, if you do use passwords, there are few ways to make it easier on yourself:

Use a password manager. While not foolproof, they can prevent the need to remember 100 passwords. Just keep in mind that if the password manager website is breached, so are your passwords. If they get your master password, they have all of your passwords and therefore ALL of them will need to be changed. Using a password manager that stores passwords on your device is far more preferable to a service that saves them in a cloud that could be breached.

Use a base password and modify it slightly for each website. Think of a password or phrase of at least eight characters and use letters from the website to complete it. For example, if you’re going to Amazon.com, you could have a base as “Ryt1#” and add the first two letters to make a unique one. So, your password for that site is “Ryt1#Am.”

Make a clue. If you need to write them down, use it as a last resort and don’t write down the whole password. Give yourself a clue to trigger your memory. It’s best to write it on paper and lock it away. If it’s on your device and that is compromised or stolen, so is your password list.

Whatever you do, don’t make your password “123456” or “football.” Those are widely used along with other common ones. The hackers have your number if you use those. You can bet on it.


How To Create A Strong And Unique  Password For Every Account

Education

How To Create A Strong And Unique Password For Every Account

Most of us know by now not to use the same passwords for different accounts; yet some of us still do. But users who continue to use passwords they know have been exposed in a hack are truly flirting with danger. In a recent study, Google found 1.5% of passwords are still being used despite those users knowing they’ve been compromised. A security researcher discovered more than 22 million unique passwords and over 770 million email addresses were made public on a popular hacker forum earlier this year. READ FULL STORY

AI-Generated Phishing — The Security Landscape Changes

Scams & Phishing

AI-Generated Phishing — The Security Landscape Changes

Phishing scams, the scourge of businesses everywhere, are getting a facelift thanks to generative AI. Already the reason for 90% of all data breaches, phishing is getting much more difficult to spot thanks to generative AI. Traditional ways of identifying phishing scams are becoming obsolete and businesses are in the crosshairs of this new generation of phishing attacks. That's why creating a more effective response is in the best interest of every organization. READ FULL STORY

 Storing Passwords In Your Browser…It’s Convenient, BUT Very Risky Too

Your Security

Storing Passwords In Your Browser…It’s Convenient, BUT Very Risky Too

Most of us know that password fatigue can lead to security mishaps and that creating a safe and secure entrance into our personal or work accounts can be a real challenge. Fortunately, security experts also know that safe password use has long been a problem, one that can lead to epic malware infections like ransomware, banking trojans, and more. Popular browsers like Chrome, Firefox, Safari, and Opera offer the option to store passwords for you, but hackers using the malware “RedLine Stealer” can hijack those stored passwords in a heartbeat. READ FULL STORY

Protect Yourself From Phishing Scams: 8 Steps To Better Security

Scams & Phishing

Protect Yourself From Phishing Scams: 8 Steps To Better Security

Since the mid 1990’s, email phishing scams have been on the rise. Like most cybercrimes, hackers have improved and refined their phishing methods over time. Now, there’s been a massive increase in targets due to the continuing coronavirus epidemic. Email phishing continues to be the method of choice for many cybercriminals to enter your device, steal your data, identity, finances, and more. A study by Tessian finds that 96% of phishing attacks arrive via email, showing the threat is very real. READ FULL STORY

Tips for Securing Your Mobile Devices

Education

Tips for Securing Your Mobile Devices

Nearly all of us these days have some type of mobile device that is essentially a part of us. It is filled with all kinds of personal information, such as our contacts, our email conversations, and perhaps even our health information. Losing it, having it accessed without permission, or finding out it’s infested with malware can be a really scary moment. Fortunately, there are some things you can do to protect those devices and the information on them. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...