(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which Authentication Option is Best?

Which Authentication Option is Best?

Smartphones have steadily increased in their capabilities, and as they have done so, they have resultantly gathered more and more data that needs to be secured against potential security threats. Fortunately, there are also more ways to protect your smartphone than ever before. For today’s blog, we’ll take a look of the options you have to secure your devices.

The Password
Passwords are the reigning king of authentication. A well-regarded password is your average user’s go-to; and, if not created with security in mind, can be very problematic. Since users have problem remembering new passwords, even if it’s one that they are able to choose, many users will create obvious passwords that can easily be guessed or hacked.

Conversely, a password (or the passphrase) can be one of the strongest security measures available for your mobile device, as it is important for every mobile user, especially one that has access to business networks, to secure their devices.

The Pattern Lock
The second option we will go over is called a pattern lock. It is the three-by-three swipe-based gesture that unlocks the device. This natural and intuitive lock is very fast, and if all nine dots are used in a pattern, it provides close to 400,000 possible configurations. Pattern lock comes up short in a couple ways. People tend to use shapes that are more easily guessable. It’s also relatively easy to ascertain the password if you watch a user’s hand.

The PIN
The PIN authentication option is a relatively strong one, as the typical four numeral option has over 10,000 different combinations. Android features the ability to support up to 16 digits. That’s 10 quadrillion different combinations. Of course, not many people are going to be able to remember a 16-digit PIN (and how annoying would it be to have to enter that every time you unlock your phone?). Simple pins are the norm, and therefore not very secure.

The Fingerprint Scanner
This authentication method is now becoming standard on most smartphones and has by-in-large been very popular. It’s secure enough to be trustworthy, and very fast. Moreover, many financial applications utilize the fingerprint as a form of authentication, making the option that much more attractive. The only drawbacks are that sometimes manufacturers will put it in an inconvenient spot on the device and that it doesn’t work with gloves.

Using the Face
All newer smartphones have been taking advantage of facial recognition software. This allows a user to gain access by just glancing at the phone. Since this is an operating system-dependent option, most phones will be getting this option. It may not currently be the most secure option, but as the technology advances, this will be the go-to method for all authentication.

Other Security Measures
Many phones now also offer security features that rely on alternative forms of authentication. On-body detection keeps the device unlocked whenever it is being carried - regardless of who is carrying it. Other options such as having your device unlock when a user says “Okay, Google” is more for convenience than privacy or device security.

What’s the Best Option?
Currently, if you are looking for the most secure and accessible option, your best bet is to use the fingerprint scanner on your phone. Back that up with a five-or-six-digit PIN and you’ll be good to go. In the future, expect the facial recognition software to improve precipitously; and, therefore, be the most secure (and popular) option to get into a mobile device.

What form do you use? Leave your favorite security methods in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Backup Internet Malware Google Mobile Devices Efficiency VoIP IT Support Business Email Network Security IT Services Managed Service Provider Miscellaneous Workplace Tips Server Innovation Data Upgrade Disaster Recovery Business Continuity Network Business Management Software Windows Saving Money Hardware Communication Computer Managed IT Services Save Money Android Mobile Device Management Virtualization Browser Smartphone Data Backup User Tips Smartphones communications Holiday Cybercrime Microsoft Office Outsourced IT Internet of Things BYOD Windows 10 WiFi Computers Hacking Chrome Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing IT Solutions VPN Managed IT Services Alert Application Apple Automation Proactive IT Avoiding Downtime Collaboration The Internet of Things Quick Tips Tech Term Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget Mobility Health Bring Your Own Device Recovery spam Cybersecurity Gadgets Telephone Systems Bandwidth Artificial Intelligence Managed IT Going Green Remote Computing IT Support Office 365 User Error Two-factor Authentication Data Protection Document Management Vendor Management Business Intelligence Website iPhone Money Save Time Firewall App Router Gmail Private Cloud How To Vulnerability Compliance Data Security Redundancy Wireless Technology Law Enforcement Data Management Productivity Risk Management Word PowerPoint Windows 10 Connectivity Excel Phone System Antivirus Office Tips Content Filtering Downtime Facebook History Entertainment Tablet Lithium-ion battery Analytics Value Retail Memory Search Phishing Identity Theft Networking Mouse Apps Black Market Solid State Drive Applications Humor Infrastructure Saving Time Statistics Analysis Data Storage Streaming Media Internet Exlporer Workers Data storage Online Currency Biometrics Comparison Encryption Sports Business Owner Outlook Windows 7 Printer eWaste OneNote YouTube Flexibility USB Hard Drives Current Events IT Management Mobile Device Work/Life Balance Administration Servers Maintenance Smart Tech IT Plan Running Cable Physical Security DDoS CES Unified Threat Management Robot Data loss Skype Unsupported Software Update Google Drive Public Cloud Mobile Office Environment Content Management Customer Relationship Management Intranet Human Resources SaaS Training Best Available Safety HIPAA People Programming Government Network Congestion Credit Cards Cleaning Meetings Trending Education HaaS Fax Server IT Consultant Professional Services Hacker Google Apps Strategy Piracy Computer Fan Lifestyle Cast Worker Commute Cost Management Authentication Amazon Wire Tip of the week Shadow IT Tools User Wireless Files Science Company Culture Licensing FENG Password Instant Messaging Wi-Fi Shortcut Nanotechnology Amazon Web Services Smart Office Windows 8.1 Update Samsung Windows Server 2008 SharePoint Colocation Twitter Windows 8 Password Manager Accountants Electronic Medical Records Bluetooth Online Shopping Paperless Office Crowdfunding Botnet Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Specifications Data Warehousing Notifications Legal Devices Evernote Students Regulations Travel Print Server Reputation Wearable Technology End of Support Recycling Windows Media Player Social IoT Millennials NarrowBand Wireless Charging Healthcare Customers Internet exploMicrosoft Criminal Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Best Practice Chromecast WIndows 7 Fiber-Optic Electronic Health Records Flash Software as a Service Patch Management Advertising Analyitcs Insurance Telecommuting Content Filter Laptop Managing Stress Settings Cables Machine Learning Sync Scam Distributed Denial of Service Virus Virtual Desktop Practices Touchscreen Remote Work Storage LinkedIn Charger Software Tips Touchpad IT service Unified Communications HVAC Telephony Debate Google Docs Relocation Hybrid Cloud Virtual Reality Blockchain Computer Accessories Hosted Computing Addiction Computer Care Uninterrupted Power Supply Domains Theft Start Menu Spam Blocking Voice over Internet Protocol Audit IaaS PDF Bloatware Staff Cameras Customer Service Inventory Cache Video Surveillance HBO Keyboard Consultant Cortana Mobile Digital Signature Multi-Factor Security Screen Mirroring Entrepreneur Printer Server Access Control Fraud Wireless Internet Frequently Asked Questions Tech Support Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Users Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery