© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Industry News / Passwords & KBA Are On The Way Out

Passwords & KBA Are On The Way Out

  • Author
    Nok Nok News
  • Published
    18 May 2022
  • 0 comments
    Join Conversation
Industry News

For nearly as long as there have been computers, the proverbial key that unlocked the gate to programs, accounts, and data has traditionally been the password. As a reinforcement to this, additional help in the form of knowledge-based authentication, or KBA, has been added. Now, however, passwordless authentication and other mechanisms like biometrics are coming into their own as passwords, and KBA fall out of fashion, and there are good reasons for this.

Convenience Is Decreasing

Password and KBA systems were originally adopted because they were cheap, easy, and comparatively secure. However, of those three qualities, only cheap remains true today. In terms of ease of use, passwords and KBA systems are now becoming more and more cumbersome. For example, most security recommendations now require a password not to be easy to decipher or remember. Best practices recommend a random string of alphanumerics to discourage an automated system from figuring out a password through a process of elimination.

Knowledge-based authentication, which asks “secret questions” or provides hints or secondary forms of access based on knowledge only a user could know, is also being scrutinized. In many cases, the metrics of a KBA, such as the name of a pet, or a mother’s maiden name, may be gleaned from diligent studies of a person on social media, where much of this information has been publicly voluntarily posted.

Vulnerability Is Increasing

A single-password-only security system is becoming one of the least secure measures against cyber attacks. By deciphering just one password, a criminal can potentially gain access to personal information, sensitive financial data, and, worst of all, actual funds. With the constant evolution of techniques such as “phishing” and “man in the middle attacks,” intercepting and using passwords is becoming easier than ever for criminals.

The counter to this of making passwords and KBA systems more difficult is causing them to become inconvenient and even intrusive for users. Polls now indicate that passwords and KBA systems are losing popularity both at the system maintenance level due to vulnerability and the general user level as they become less convenient in the effort to make them more secure.

Passwordless Authentication Is A Solution

The solution to this is the implementation of passwordless authentication systems. As the name suggests, passwordless authentication does away with passwords entirely. Other methods, such as biometrics, ensure that a user always has the proper “key” since all that’s required is a face, fingerprint, or other unique identifiers. 

If you’d like to learn more about multifactor authentication technology and passwordless security, look at Nok Nok’s products here.

Nok Nok News

Related Posts

The US Government Now Wants Phishing Resistant MFA
Industry News

The US Government Now Wants Phishing Resistant MFA

The Government Is Now Turning To The Private Sector For Better Cybersecurity
Industry News

The Government Is Now Turning To The Private Sector For Better Cybersecurity

The US Government Is Ramping Up Cybersecurity Precautions
Industry News

The US Government Is Ramping Up Cybersecurity Precautions

Intuit Announce New Advances In Digital Financial Management
Industry News

Intuit Announce New Advances In Digital Financial Management

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語