The death of the password has been rumored for years, but to this day it remains the primary way we identify ourselves online, with the average user now managing well over 100 accounts that require a password. Yet changing tides in the cybersecurity landscape, combined with evolving technology and consumer preferences, indicate that the end of the password era may finally be at hand.

Consumers Embrace Alternatives to Password Protection

In the wake of countless data breaches, consumers are becoming increasingly security-aware and open to changes in the way they identify themselves online. In a recent IBM Security study, respondents ranked security as their top priority over convenience when logging in to the majority of applications.

As options such as biometrics, multifactor authentication (MFA) and password managers become more advanced, consumers are already starting to move beyond password-only approaches and embrace a new future of identity. The IBM study found that fingerprint scans are seen as the most secure method of authentication. In addition, 67 percent of consumers are using biometric authentication today, while 87 percent said they’d be open to this technology in the future.

Millennials, currently the largest generation in the U.S. workforce, are at the forefront of driving these changes. With a stronger preference for convenience, younger generations are the most likely to embrace biometrics. They are also twice as likely as older generations (ages 55+) to use a password manager to lock down their accounts.

‘Today’ Takes a Closer Look at the Future of Identity

NBC’s Tom Costello recently joined IBM X-Force experts at the Cyber Range in Cambridge, Massachusetts, to discuss why password-only approaches are becoming obsolete and what the future may hold in terms of how we prove our identities online.

Check out the full “Today” segment, along with tips to protect yourself online:

To learn more about consumer trends around identity and access, check out IBM’s “Future of Identity Study.” You can also get highlights and additional analysis from this podcast and blog series.

Read the complete “IBM Future of Identity Study”

More from Identity & Access

How to Keep Your Secrets Safe: A Password Primer

There are two kinds of companies in the world: those that have been breached by criminals, and those that have been breached and don't know it yet. Criminals are relentless. Today’s cyberattacks have evolved into high-level espionage perpetrated by robust criminal organizations or nation-states. In the era of software as a service (SaaS), enterprise data is more likely to be stored on the cloud rather than on prem. Using sophisticated cloud scanning software, criminals can breach an enterprise system within…

Making the Leap: The Risks and Benefits of Passwordless Authentication

The password isn't going anywhere. Passwordless authentication is gaining momentum, though. It appears to be winning the battle of how companies are choosing to log in. Like it or not, the security industry must contend with both in the future.  But for some businesses and agencies, going passwordless is the clear strategy. Microsoft, for instance, has recently stopped forcing users to use a password to access their account, which allows access to a wide range of Microsoft business and personal…

Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments

While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the migration and introduced innovations of their own to exploit the platforms. Most of these exploits are based on poor configurations and human error. New IBM Security X-Force data reveals that many cloud-adopting businesses are falling behind on basic security best practices, introducing more risk to their organizations. Shedding light on…

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be achieved after successfully rolling out an identity strategy. They all talk about reduction in friction, improving users' perception of the…