{"id":97878,"date":"2021-09-30T09:00:46","date_gmt":"2021-09-30T16:00:46","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=97878"},"modified":"2024-09-12T13:48:42","modified_gmt":"2024-09-12T20:48:42","slug":"3-key-resources-to-accelerate-your-passwordless-journey","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/30\/3-key-resources-to-accelerate-your-passwordless-journey\/","title":{"rendered":"3 key resources to accelerate your passwordless journey"},"content":{"rendered":"
Every organization today faces password-related challenges\u2014phishing campaigns, productivity loss, and password management costs to name just a few. The risks now outweigh the benefits when it comes to passwords. Even the strongest passwords are easily phish-able and vulnerable to attacks, such as password spray and credential stuffing. People don\u2019t like them either\u2014a third of people surveyed<\/a> say they\u2019d rather abandon a website than reset their password. \u201cI don\u2019t have any more passwords left in me,\u201d is becoming an all-too-common feeling. It\u2019s time to look at password alternatives that are both highly secure and convenient. Here’s a few key resources that can help you as you plan for and deploy passwordless<\/a> for your organization.<\/p>\n Today, the technology exists to make sign-ins simpler and more secure. Two protocols, WebAuthn and CTAP2, form what is known as the FIDO2 standard<\/a>\u2014which enables organizations to upgrade their authentication methods to strong hardware-backed multifactor authentication<\/a> options that don\u2019t rely on passwords at all. Instead, you can use a physical key, laptop, or mobile app as your credential. Two questions customers often ask are which method do I choose and how do I get started?<\/p>\n I recently published an update to our Passwordless Protection whitepaper<\/a>, which breaks down the different authentication methods, adoption strategies, and use cases. This guide gives you a great starting point for thinking through your strategy and a foundational understanding of how passwordless authentication works and the requirements for each of the options.<\/p>\n <\/p>\n This year, my colleagues also created a series of blog posts 10 reasons to love passwordless<\/a>, which expands on many of the concepts in the whitepaper.<\/p>\n Check out the passwordless authentication deployment guide<\/a>, which goes in-depth into how to plan the project, deploy different methods, and manage policies for passwordless authentication based on what we\u2019ve learned from thousands of implementations with customers. Use the passwordless recommendations tool<\/a> in the Microsoft admin console to help you choose the right method for each of your audiences.<\/p>\n <\/p>\n You can also get a hands-on tour of passwordless capabilities in Microsoft Azure Active Directory from the video Microsoft Mechanics<\/a> with Joy Chik, Corporate Vice President, Identity and Network Access, and host Jeremy Chapman.<\/p>\n <\/p>\n Data is useful, but sometimes you want to hear from people with experience. Watch the\u00a0Your Passwordless Future Starts Now<\/strong><\/a> digital event on-demand, where you\u2019ll learn more about passwordless authentication and best practices for adopting an organization-wide passwordless strategy.<\/p>\n For additional resources and the latest customer stories, visit the Microsoft passwordless web page<\/a>.<\/p>\n To learn more about Microsoft Security solutions,\u00a0visit our\u00a0website<\/a>.\u00a0Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" The risks now outweigh the benefits for organizations using passwords as a security mechanism. In this post, we share the top resources to help you move forward on your passwordless journey. <\/p>\n","protected":false},"author":106,"featured_media":97959,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3678],"products":[3702,3703],"threat-intelligence":[],"tags":[3823],"coauthors":[2153],"class_list":["post-97878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-multifactor-authentication","products-microsoft-entra","products-microsoft-entra-id","tag-password-protection","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-9-1694638266-118","review-flag-new-1694638263-340","review-flag-percent"],"yoast_head":"\n1. Preparing your organization for passwordless authentication<\/h2>\n
10 reasons to love passwordless<\/h3>\n
\n
2. Planning your passwordless deployment<\/h2>\n
3. Learning from experts<\/h2>\n
You\u2019ll learn how to:<\/h3>\n
\n
Learn more<\/h2>\n