{"id":4798,"date":"2020-05-13T10:00:00","date_gmt":"2020-05-13T07:00:00","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=4798"},"modified":"2020-05-13T10:27:52","modified_gmt":"2020-05-13T07:27:52","slug":"the-future-of-the-password","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/","title":{"rendered":"The future of the password\u2026"},"content":{"rendered":"\n<p>Ever worry that your password may have been compromised? You\u2019re not alone. It can feel like every day you\u2019re having to sign up for a new platform or service, and as a result, you are likely using variations of the same password, changing a number here or a letter there in an effort to keep your passwords secure and still remember them.<\/p>\n\n\n\n<p>Although trying to remember multiple passwords is a nuisance, the consequences of a weak password can be dire. Data breaches and mass-scale thefts of personal data are increasing in frequency, and the current coronavirus situation has only exacerbated this further. In early April, the popular conferencing platform Zoom revealed that&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/04\/28\/zoom-gets-stuffed-heres-how-hackers-got-hold-of-500000-passwords\/#7c95581e5cdc\" target=\"_blank\" rel=\"noreferrer noopener\">half a million stolen passwords<\/a>&nbsp;were up for sale on the dark web, and phishing scams have increased exponentially.<\/p>\n\n\n\n<p>Passwords are the key to keeping our digital lives secure, and yet they\u2019re not very secure by themselves. Without a password manager or&nbsp;<a href=\"https:\/\/www.eset.com\/us\/business\/endpoint-security\/two-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a>, it is relatively easy for hackers to crack people\u2019s passwords, not least because \u201c123456,\u201d \u201cqwerty\u201d and \u201cpassword\u201d are still some of the most commonly used passwords across the globe. In fact, many of the leading minds in tech want to eradicate passwords altogether.<\/p>\n\n\n\n<p>It is now pretty commonplace to open your phone with your fingerprint or your face, and soon, biometric identification might be the norm for accessing all kinds of personal data. Since 2015, Google has worked to limit both the use of and the need for passwords in Android phones. Microsoft, too, launched its own alternatives, introducing a biometric login system in order to avoid the need for conventional passwords. The fight against our overreliance on passwords even has an open industry body backing the cause \u2013&nbsp;<a href=\"https:\/\/fidoalliance.org\/members\/\" target=\"_blank\" rel=\"noreferrer noopener\">The FIDO Alliance<\/a>, which includes member companies such as Google, Facebook, PayPal, Visa and Amazon.<\/p>\n\n\n\n<p>With the creation of the FIDO2 standard (essentially a means to enable a browser-based world to authenticate the user using means stronger than passwords, which can, of course, be forgotten or accidentally given to someone operating as a phisher), it is clear that the technologies to replace passwords exist. Yet adoption has been slow. Despite some companies like Dropbox adopting this form of user identification, it has been used as a second layer of security for passwords, when it was really intended to be the first line of defense.<\/p>\n\n\n\n<p>While it is unlikely that we\u2019ll see passwords completely disappear anytime soon, they may begin to take a backseat to more secure forms of identification such as FIDO2, just as you can still use your PIN to open your phone if your fingerprint or face doesn\u2019t register. In the meantime, there is no excuse to slack off on password safety!<\/p>\n\n\n\n<p>Ensure you\u2019re using strong passwords and invest in a password manager for both yourself and your business, such as&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.eset.com\/blog\/new-products\/eset-password-manager-here-to-improve-your-online-security-1\/\" target=\"_blank\">ESET Password Manager<\/a>. While recovering a personal password might not be too difficult, accidentally compromising business data can be much trickier to recover from. Take a moment to review your own password protections \u2013 it just might save you a lot of hassle down the track!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ever worry that your password may have been compromised? You\u2019re not alone. It can feel like every day you\u2019re having to sign up for a new platform or service, and as a result, you are likely using variations of the same password, changing a number here or a letter there in an effort to keep<\/p>\n","protected":false},"author":5,"featured_media":4799,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[164],"tags":[],"class_list":["post-4798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The future of the password\u2026 - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The future of the password\u2026\" \/>\n<meta property=\"og:description\" content=\"Ever worry that your password may have been compromised? You\u2019re not alone. It can feel like every day you\u2019re having to sign up for a new platform or service, and as a result, you are likely using variations of the same password, changing a number here or a letter there in an effort to keep\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-13T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-13T07:27:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/Passwords_1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"The future of the password\u2026\",\"datePublished\":\"2020-05-13T07:00:00+00:00\",\"dateModified\":\"2020-05-13T07:27:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/\"},\"wordCount\":527,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Passwords_1200x628.jpg\",\"articleSection\":[\"password\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/\",\"name\":\"The future of the password\u2026 - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Passwords_1200x628.jpg\",\"datePublished\":\"2020-05-13T07:00:00+00:00\",\"dateModified\":\"2020-05-13T07:27:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Passwords_1200x628.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Passwords_1200x628.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The future of the password\u2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/05\\\/13\\\/the-future-of-the-password\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The future of the password\u2026 - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/","og_locale":"en_US","og_type":"article","og_title":"The future of the password\u2026","og_description":"Ever worry that your password may have been compromised? You\u2019re not alone. It can feel like every day you\u2019re having to sign up for a new platform or service, and as a result, you are likely using variations of the same password, changing a number here or a letter there in an effort to keep","og_url":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2020-05-13T07:00:00+00:00","article_modified_time":"2020-05-13T07:27:52+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/Passwords_1200x628.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"The future of the password\u2026","datePublished":"2020-05-13T07:00:00+00:00","dateModified":"2020-05-13T07:27:52+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/"},"wordCount":527,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/Passwords_1200x628.jpg","articleSection":["password"],"inLanguage":"en-US","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/","url":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/","name":"The future of the password\u2026 - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/Passwords_1200x628.jpg","datePublished":"2020-05-13T07:00:00+00:00","dateModified":"2020-05-13T07:27:52+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/Passwords_1200x628.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/05\/Passwords_1200x628.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"The future of the password\u2026"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/05\/13\/the-future-of-the-password\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/4798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=4798"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/4798\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/4799"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=4798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=4798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=4798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}