Many of us have replaced keyed door locks with electronic locks that use codes to unlock doors. They emulate the PIN technology we use to unlock our computers. Our computer technology, however, is going the other way. Physical keys – with PIN codes – are proving safer and more convenient in office environments.
In many offices, an administrative assistant or another employee may need to access the email or a website of an employee who is out of the office. Two-factor authentication (2FA) – which should be installed – usually requires access to a second device, such as a cell phone or an email address. If the account owner is not available, 2FA won’t work, unless the system is set up to work with another person’s devices. That gets really complicated, and it can be compromised.
A security key is a much more secure passwordless form of 2FA. The term security key should not be used interchangeably with passkeys, which are another form of passwordless security. Security keys are physical devices that typically work through a USB-C port, but they are not limited to USB-C. They can use USB-A ports and Apple’s Lightning ports.
When you or an authorized user logs in, that person enters your password and then uses the security key, which generates a unique code or signature to confirm your identity. That makes it difficult for unauthorized users to access your account even if they have your password.
Security keys utilize public-key cryptography, making them resistant to phishing and credential theft. They can be used with cell phones, and to be honest, not enough of our clients are setting them up on their phones. They can be more secure in public places.
Security keys work with virtually all password managers, but they need to be supported by website hosts and the cloud providers they use, such as AWS. That support is getting stronger as many services now recognize their importance for enhancing online security. Security keys are compatible with various platforms and applications, providing reliable authentication without the risks associated with cloud storage.
Security keys are relatively inexpensive to purchase, but they do require specific setup and customization. We can help you with a comprehensive purchase and deployment program. Call us – 973-433-6676 – or email us to discuss your needs and develop a program.
