In my previous blog, I briefly touched on the fact that many Internet of Things (IoT) devices today have defaulted to the lowest common denominator for security and authentication: passwords. IoT devices — particularly mobile devices — introduce security and privacy risks because most have a limited user interface that can only handle short, easy-to-crack passwords.
The proliferation of mobile and IoT-connected devices has accelerated the need for user authentication that moves beyond passwords, and there is evidence that individuals increasingly view password-based authentication as ill-suited for today’s complex threat landscape.
This blog will examine the strengths and weaknesses of passwords for mobile and IoT authentication, and what alternatives exist for businesses and individuals to move beyond passwords.