Brian Wallace Blog | Why It's Time To Rethink Authentication Methods | TalkMarkets
Founder and President, NowSourcing / Infographic Marketing Expert
Brian Wallace is the Founder and President of NowSourcing, an industry leading content marketing agency that makes the world's ideas simple, visual, and influential. Brian has been named a Google Small Business Advisor for 2016-present, joined the SXSW Advisory Board in 2019-present and became an ...more

Why It's Time To Rethink Authentication Methods

Date: Tuesday, September 22, 2020 5:37 AM EDT

It’s time to reevaluate authentication methods. When you sign in using a password and username, chances are you don’t even realize those things were never meant to protect anything or be secure. But how can you keep your information secure without using the same protocols that have been in place for decades? It turns out there are many different ways to authenticate users, many of which are far more secure. 

Passwords and even security questions are weak because they rely on shared secrets, and those secrets are usually widely available on the deep web. Out of bound voice authentication is slightly more secure, relying on a known phone number to authenticate a user, however phone calls can easily be intercepted and rerouted. Biometrics are considerably more secure, if for no other reason than it’s a big hassle to hack them, though it is doable.

Asymmetric cryptography is probably the most secure authentication method available today, using IP addresses, biometrics, geolocation, and more to authenticate a user.

Learn more about authentication methods below.

 

Disclaimer: This and other personal blog posts are not reviewed, monitored or endorsed by TalkMarkets. The content is solely the view of the author and TalkMarkets is not responsible for the content of this post in any way. Our curated content which is handpicked by our editorial team may be viewed here.

Comments

Leave a comment to automatically be entered into our contest to win a free Echo Show.