February 28, 2018 By Cassy Lalan 2 min read

The death of the password has been rumored for years, but to this day it remains the primary way we identify ourselves online, with the average user now managing well over 100 accounts that require a password. Yet changing tides in the cybersecurity landscape, combined with evolving technology and consumer preferences, indicate that the end of the password era may finally be at hand.

Consumers Embrace Alternatives to Password Protection

In the wake of countless data breaches, consumers are becoming increasingly security-aware and open to changes in the way they identify themselves online. In a recent IBM Security study, respondents ranked security as their top priority over convenience when logging in to the majority of applications.

As options such as biometrics, multifactor authentication (MFA) and password managers become more advanced, consumers are already starting to move beyond password-only approaches and embrace a new future of identity. The IBM study found that fingerprint scans are seen as the most secure method of authentication. In addition, 67 percent of consumers are using biometric authentication today, while 87 percent said they’d be open to this technology in the future.

Millennials, currently the largest generation in the U.S. workforce, are at the forefront of driving these changes. With a stronger preference for convenience, younger generations are the most likely to embrace biometrics. They are also twice as likely as older generations (ages 55+) to use a password manager to lock down their accounts.

‘Today’ Takes a Closer Look at the Future of Identity

NBC’s Tom Costello recently joined IBM X-Force experts at the Cyber Range in Cambridge, Massachusetts, to discuss why password-only approaches are becoming obsolete and what the future may hold in terms of how we prove our identities online.

Check out the full “Today” segment, along with tips to protect yourself online:

To learn more about consumer trends around identity and access, check out IBM’s “Future of Identity Study.” You can also get highlights and additional analysis from this podcast and blog series.

Read the complete “IBM Future of Identity Study”

More from Identity & Access

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today