P RE D I C T I V E I NTELLIGEN CE
in authenticators such as fingerprint
sensors or facial recognition cameras
included in many devices.
This choice of authenticators now
provides users with a much-improved
experience for account management
and recovery.
For example, a user can choose to
use a fingerprint reader to log in to
mobile apps on a mobile device and
also register a hardware security key.
This makes it easy to quickly establish
access to accounts on a new device
if the original device is upgraded, lost,
stolen or compromised.
Putting an end to account
takeovers and stolen credentials
For years, users have been reliant on
usernames and passwords to protect
their online accounts.
Today, millions of user credentials from
data breaches around the world are now
accessible on the web, including 773
million records known as Collection #1,
34
With much of
our personal and
business lives now
online, the need for
stronger security
has never been more
important to protect
our digital identities.
making stolen credentials the cause of
the vast majority of account takeovers.
With WebAuthn, users no longer have to
rely on the weak security of passwords.
Going forward, users can expect
services to offer WebAuthn strong
authentication methods including the
option to use security keys and built-in
platform authenticators to protect online
accounts. WebAuthn represents a
major step forward in Internet security,
paving the way to a world of user-
friendly and highly-secure password-
free authentication.
Outlook
With the approval of the new WebAuthn
standard, major web browsers and
Issue 15
|
www.intelligentciso.com