Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s Been Another Step Towards Passwordless Authentication

There’s Been Another Step Towards Passwordless Authentication

While at the moment, passwords are an important part of your security stack, it is important to acknowledge that the concept of the password was always a flawed system and is overdue to be replaced. This may become a widespread reality sooner than you may expect, too, especially with the buy-in that the big names in tech are demonstrating.

Let’s consider a recent step that one of these big names recently took that shows particular promise for a passwordless future.

Enter the Passkey, and Google’s Embrace of It

The concept of a passkey is a simple one—basically, it’s another stored credential, but in this case, it is stored on the device and is exchanged with the website directly. This way, all obligations for the user to remember any credentials is eliminated.

The passkey is, on almost all counts, a superior means of authentication—and it’s all because it eliminates the need for a password text box at all. Instead of relying on the user to provide a form of authentication, passkeys are automatically generated and are inherently more secure than any user-generated form of authentication.

The trouble is, in order for passkeys to work, support for them will need to become standard. As in, every website, every browser, and every password manager will need to implement them. In addition to this, passkeys will require the user to have their phone handy and to use a Bluetooth connection to allow the phone to talk to the device in use. This localization, while helping protect your accounts, will also eliminate the capability of most desktops to utilize it.

Google, and Many Others, are Enthusiastic about Passkeys

Apple, Google, the FIDO Alliance, and Microsoft have all put their support behind the idea, with Google launching betas on both Chrome and Android, and iOS version 16 implementing it.

Google’s beta—which you can sign up for through Play Services—allows you to create passkeys on your Android devices, and passkeys are now supported in Chrome Canary, with more stable versions promised soon.

Google’s plan is to utilize its Password Manager to store these passkeys. The mobile device will have the user pick the correct account, then use a biometric proof to authenticate their identity. The phone will send over the authentication via Bluetooth, the browser sends the passkey to the website, and you’re in. Of course, if you’re actively logging in to something on your phone, the Bluetooth step is skipped.

We look forward to seeing how this technology develops and the prospect of using it as a means of potentially simplifying user authentication, without shortchanging security as a result. While there’s still some work to be done, the promise is there. In the meantime, reach out to us at 800.618.9844 to find out how we can help you manage your current cybersecurity and user authentication needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Automation Facebook Miscellaneous Artificial Intelligence Holiday Training Compliance Gadgets Cloud Computing Covid-19 Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Virtualization Blockchain Bandwidth Mobile Office Managed Services Two-factor Authentication Data Security Apps Vendor App Tip of the week Mobile Device Management Voice over Internet Protocol Gmail Networking WiFi Chrome Budget Employer-Employee Relationship BYOD Apple Avoiding Downtime Access Control Marketing Computing Conferencing Information Technology Office 365 Managed IT Services How To BDR HIPAA Physical Security Applications Hacker Health 2FA Website Help Desk Operating System Risk Management Retail Healthcare Office Tips Analytics Big Data Augmented Reality Storage Password Bring Your Own Device Router Computers Virtual Private Network Printer Going Green Paperless Office Windows 11 Infrastructure Monitoring Cybercrime Excel Document Management Firewall Remote Workers Managed IT Service Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Display Computer Repair Mobile Security Processor Wireless Technology Holidays Data Storage Settings Printing Wireless Smart Technology Supply Chain Content Filtering Video Conferencing Word Machine Learning Managed Services Provider Saving Time YouTube Virtual Machines Professional Services Cryptocurrency Maintenance Antivirus Downloads Safety Virtual Desktop iPhone Licensing Data storage LiFi Entertainment Vulnerabilities Data Privacy Outlook Money Images 101 Humor Telephone System Multi-Factor Authentication Robot Mobility Cost Management Customer Relationship Management Sports Mouse IT Management VPN Employees Meetings Integration Hacking Administration Presentation User Tip Modem Virtual Assistant Outsource IT Legal IT solutions Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Business Growth IP Address Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Cortana Alt Codes Websites Mirgation Hypervisor Displays Shopping Recovery Downtime Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Hard Drives Hosted Solution Addiction Typing Management PCI DSS Chatbots Navigation Domains Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Knowledge Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Google Drive Refrigeration Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Public Speaking Lithium-ion battery Superfish Bookmark Identity Theft Smart Tech Memes 5G Co-managed IT Experience Twitter Alerts SQL Server Technology Care Google Docs Unified Communications Download Net Neutrality Entrepreneur Bitcoin Financial Data Running Cable Error History Business Communications Google Wallet Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Undo Upload Procurement Windows 8 Social Network Telework Laptop Cyber security Multi-Factor Security Tech Human Resources Drones CES Tablet IoT Communitications Dark Web Cables Alert Trends Supply Chain Management Managed IT Customer Resource management FinTech Halloween File Sharing Regulations Dark Data Google Calendar Term Google Apps Data Analysis Application Star Wars IT Assessment How To Microsoft Excel IT Maintenance Gamification Flexibility Notifications Staff Value Business Intelligence IBM Hacks Organization Scary Stories Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Fun Content Remote Working Wearable Technology Memory Vendors Deep Learning Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Education Assessment Electronic Health Records Wasting Time Threats Competition Mobile Computing Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Internet Exlporer Software as a Service Search Username Managing Costs Amazon Best Practice User Buisness Point of Sale eCommerce Black Friday SSID

Blog Archive