© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Industry News / Multifactor Authentication For Online Services Is A Matter Of When Not How

Multifactor Authentication For Online Services Is A Matter Of When Not How

  • Author
    Nok Nok News
  • Published
    25 May 2022
  • 0 comments
    Join Conversation
Industry News

As the world’s digital connectivity grows exponentially through the proliferation of people on devices accessing online services, any device at any location with access to wireless internet can be used to access any data, software or services anywhere in the world. This makes it possible to start work at home on a laptop, pick it up at the office on a desktop, and then sign off on it at a restaurant with a smartphone.

However, the convenience of online services also means an increase in vulnerability- especially when outside the “perimeter”. The access “anytime, anywhere ,on any device across any network“ is why regions like Europe are moving toward mandatory implementation of multifactor authentication in online services.

The Password Problem

Today’s legacy knowledge-based security and access (KBA) systems that require passwords are a mature deployment path with no-added cost for offering passwords as the primary access method, beyond the cost of the security and authentication infrastructure. Unfortunately legacy KBA security methodologies are primarily reliant on a single password for accessing an online service which exposes significant vulnerabilities while expanding the attack surface for cybercriminals. 

Effective or “strong” passwords are a random string of alphanumerics, which are hard to remember and impossible to guess. This often causes many people to resort to “easier” passwords that are easy to remember, making them easier to guess and steal.

When the vulnerability of a password is extended to an online service, anyone anywhere can access information online on any device once they have stolen a legitimate password. When an account is takeover via stolen or phished user credentials the convenience of KBA-based online services becomes a massive liability.

How Multifactor Authentication Helps

Key-based Multifactor authentication, or MFA, adds additional checks beyond needing a password. Key-based Multifactor authentication can completely replace legacy security, identity and authentication systems, with modern passwordless identity verification. Key-based biometrics such as a face, voice, or thumbprint cannot be stolen by others when protected and enabled by asymmetrically encrypted private keys in user’s devices. Other mechanisms, such as encrypted USB keys, can be used to reinforce passwords by requiring an additional check beside the password, such as the presence of a USB key, or sending an additional text/SMS message to another device, like a phone, and entering in a second code.

By introducing more than one requirement for identity verification and authentication, online services are less vulnerable when someone has a legitimate password and user credential.

For this reason, federations like the European Union and even large tech companies like Google are implementing key-based multifactor authentication on a wider scale. With proper integration, MFA can be faster and easier to use than an hard-to-know, hard-to-user password while providing even more security since a key-based thumbprint, face, or voice can’t be guessed or stolen the way a password can. By providing more options and, perhaps more importantly, ensuring these options are convenient and easy to use, key-based multifactor authentication can make online services safer than ever, while dramatically lowering user friction during registration, login and even payment transaction.

If you’re interested in using the FIDO protocol and moving to a modern, key-based passwordless authentication system and zero-trust operating environment, read here to learn more.

Nok Nok News

Related Posts

The US Government Now Wants Phishing Resistant MFA
Industry News

The US Government Now Wants Phishing Resistant MFA

The Government Is Now Turning To The Private Sector For Better Cybersecurity
Industry News

The Government Is Now Turning To The Private Sector For Better Cybersecurity

The US Government Is Ramping Up Cybersecurity Precautions
Industry News

The US Government Is Ramping Up Cybersecurity Precautions

Intuit Announce New Advances In Digital Financial Management
Industry News

Intuit Announce New Advances In Digital Financial Management

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語