IT Security: Passwords and Multi Factor

IT specialist working across two laptops backing up data

In today’s world, where cyberattacks are becoming increasingly sophisticated, the methods we use to protect our online accounts have evolved significantly. At the forefront of digital security are three primary approaches: passwords, multi-factor authentication (MFA), and passwordless solutions. Each method has its own strengths and limitations, and the choice often hinges on the balance between convenience and security

Passwords: Familiar, but Flawed

For decades, passwords have been the cornerstone of authentication. They’re easy to use, widely understood, and simple to implement. However, their effectiveness is heavily dependent on user behaviour, which is often the Achilles’ heel of this method. Weak, reused, or easily guessed passwords are susceptible to phishing attacks, brute force attempts, and credential stuffing.

Recent guidelines suggest creating long passphrases instead of complex, hard-to-remember character strings. For example, “MyFavoritePizzaIsExtraCheesy” is both more secure and memorable than something like “P@ssw0rd!23”. The National Cyber Security agency has also recommended that Periodic password changes are no longer required unless there’s evidence of compromise

Despite improved password practices, relying solely on this method is considered insufficient for protecting sensitive information.

Multi-Factor Authentication: Raising the Bar

MFA enhances security by combining something you know (a password) with something you have (a one-time code or hardware token, often on your mobile phone) or something you are (biometrics like fingerprints). This added layer significantly boosts protection, as an attacker would need access to multiple factors to compromise your account.

While robust, MFA isn’t foolproof. If the “something you know” is a weak password, or if attackers exploit vulnerabilities in the second factor (e.g., SIM swapping for SMS codes or token theft), the system’s defences can be compromised. Nevertheless, MFA represents a substantial improvement over password-only security and is highly recommended for most accounts.

There are also methods using Conditional Access and Intune to reduce the risks of token theft.

Passwordless Authentication: The Future of Security

As the name implies, passwordless authentication eliminates the need for traditional passwords altogether. Instead, it leverages biometrics, hardware tokens, or “passkeys” tied to a user’s device (Windows Hello for Business is an example). This approach is fundamentally more secure because it removes the vulnerabilities associated with passwords, such as phishing or brute force attacks and is not susceptible to token theft.

Moreover, passwordless systems are not only more secure but also more user-friendly. There’s no need to remember or manage passwords, and authentication can be as simple as scanning your fingerprint or clicking a security key.

Transitioning to passwordless authentication often requires significant infrastructure changes and user education. Adoption may be slower in organizations or sectors with legacy systems, but the long-term benefits are undeniable.

A comparison of current authentication methods

Method Strengths Weaknesses
Passwords Simple and familiar to users; minimal infrastructure requirements. Highly vulnerable to human error, phishing, and automated attacks.
MFA Adds significant security by layering multiple forms of authentication. Relies on password security as a base; can be less user-friendly at times. Can be vulnerable to token theft.
Passwordless Eliminates traditional password risks; resistant to phishing and brute force. Resistant to token theft. Requires new infrastructure and user education; adoption may face hurdles.

Final Thoughts

While traditional passwords alone are no longer sufficient, combining MFA or adopting passwordless methods can dramatically enhance security. For organizations aiming to modernize their defences and embrace a Zero Trust framework, passwordless authentication is the gold standard. Meanwhile, MFA remains a highly effective and practical solution for most.

Ultimately, the decision comes down to your priorities—whether it’s achieving the highest level of security, streamlining the user experience, or a combination of both. One thing is clear: the future is moving away from passwords as we know them.

Contact us for an informal chat about your current environment and discover opportunities to enhance your IT security.