The death of the password has been rumored for years, but to this day it remains the primary way we identify ourselves online, with the average user now managing well over 100 accounts that require a password. Yet changing tides in the cybersecurity landscape, combined with evolving technology and consumer preferences, indicate that the end of the password era may finally be at hand.

Consumers Embrace Alternatives to Password Protection

In the wake of countless data breaches, consumers are becoming increasingly security-aware and open to changes in the way they identify themselves online. In a recent IBM Security study, respondents ranked security as their top priority over convenience when logging in to the majority of applications.

As options such as biometrics, multifactor authentication (MFA) and password managers become more advanced, consumers are already starting to move beyond password-only approaches and embrace a new future of identity. The IBM study found that fingerprint scans are seen as the most secure method of authentication. In addition, 67 percent of consumers are using biometric authentication today, while 87 percent said they’d be open to this technology in the future.

Millennials, currently the largest generation in the U.S. workforce, are at the forefront of driving these changes. With a stronger preference for convenience, younger generations are the most likely to embrace biometrics. They are also twice as likely as older generations (ages 55+) to use a password manager to lock down their accounts.

‘Today’ Takes a Closer Look at the Future of Identity

NBC’s Tom Costello recently joined IBM X-Force experts at the Cyber Range in Cambridge, Massachusetts, to discuss why password-only approaches are becoming obsolete and what the future may hold in terms of how we prove our identities online.

Check out the full “Today” segment, along with tips to protect yourself online:

To learn more about consumer trends around identity and access, check out IBM’s “Future of Identity Study.” You can also get highlights and additional analysis from this podcast and blog series.

Read the complete “IBM Future of Identity Study”

More from Identity & Access

CISA, NSA Issue New IAM Best Practice Guidelines

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators. As the industry increasingly moves towards cloud and hybrid computing environments, managing the complexities of digital identities can be challenging. Nonetheless, the importance of IAM cannot be overstated in today's world, where data security is more critical than ever. Meanwhile, IAM itself can be a source of vulnerability if not implemented…

4 min read

The Importance of Accessible and Inclusive Cybersecurity

4 min read - As the digital world continues to dominate our personal and work lives, it’s no surprise that cybersecurity has become critical for individuals and organizations. But society is racing toward “digital by default”, which can be a hardship for individuals unable to access digital services. People depend on these digital services for essential online services, including financial, housing, welfare, healthcare and educational services. Inclusive security ensures that such services are as widely accessible as possible and provides digital protections to users…

4 min read

What’s Going On With LastPass, and is it Safe to Use?

4 min read - When it comes to password managers, LastPass has been one of the most prominent players in the market. Since 2008, the company has focused on providing secure and convenient solutions to consumers and businesses. Or so it seemed. LastPass has been in the news recently for all the wrong reasons, with multiple reports of data breaches resulting from failed security measures. To make matters worse, many have viewed LastPass's response to these incidents as less than adequate. The company seemed…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

8 min read - View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

8 min read