Passwortlose Sicherheit

Passwordless security is still a relatively unknown procedure for many. One of the reasons for this is that it is always drilled into your head how important strong passwords are. And that is true. That’s why we keep pointing this out. But there are also ways to secure data and access completely without a password.

How does passwordless security work?

Basically, you are already on the right page for passwordless security. This is achieved through passwordless authentication, as provided by the Authenticator from REINER SCT.

Authentication takes place via the server. The server then sends the data back to the user. Without the Authenticator, the corresponding accounts cannot be accessed. So there is no need for a password anymore, but the specific authenticator with the specified accounts on it.

For authentication to an account or on a device, the authenticator sends a TOTP code. Access to the account is possible only through this code. To ensure full security, the TOTP code is also changed every 30 seconds. So unauthorized access is virtually impossible unless someone is looking over your shoulder. And even then, it should be very difficult to hack into the account.

The advantages of passwordless security

The biggest advantage of passwordless security is that weak passwords are completely wiped out. Strong passwords as well, but that is a side effect that can be accepted. In the end, no password in the world is one hundred percent secure.

Phishing is through passwordless protected accounts, so to speak. So the pond remains empty. In phishing, access data is usually requested. But these access data do not exist if the access code changes every 30 seconds. So there is nothing for phishers to fish for in a passwordless account.

For companies, passwordless security also offers the advantage of saving costs and effort. An extensive, in-house system with accounts and passwords for the numerous users in the company needs to be well maintained. This also requires an extensive IT department to ensure that data protection is maintained.

Passwordless accounts therefore not only increase security, they also reduce costs. And they make for easier handling, since there is no need for tedious password typing. Especially when you’ve forgotten a password and can’t remember exactly where the exclamation mark was, it can be tedious.

In the end, this also results in time savings due to the fast login function. Everything is secure. Everything is simple. Everything is fast. Just the way a good system should be.

The advantages of passwordless security

The biggest advantage of passwordless security is that weak passwords are completely wiped out. Strong passwords as well, but that is a side effect that can be accepted. In the end, no password in the world is one hundred percent secure.

Phishing is through passwordless protected accounts, so to speak. So the pond remains empty. In phishing, access data is usually requested. But these access data do not exist if the access code changes every 30 seconds. So there is nothing for phishers to fish for in a passwordless account.

For companies, passwordless security also offers the advantage of saving costs and effort. An extensive, in-house system with accounts and passwords for the numerous users in the company needs to be well maintained. This also requires an extensive IT department to ensure that data protection is maintained.

Passwordless accounts therefore not only increase security, they also reduce costs. And they make for easier handling, since there is no need for tedious password typing. Especially when you’ve forgotten a password and can’t remember exactly where the exclamation mark was, it can be tedious.

In the end, this also results in time savings due to the fast login function. Everything is secure. Everything is simple. Everything is fast. Just the way a good system should be.