About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Alternative IT Solutions Blog

Which Authentication Option is Best?

Which Authentication Option is Best?

Smartphones have steadily increased in their capabilities, and as they have done so, they have resultantly gathered more and more data that needs to be secured against potential security threats. Fortunately, there are also more ways to protect your smartphone than ever before. For today’s blog, we’ll take a look of the options you have to secure your devices.

The Password
Passwords are the reigning king of authentication. A well-regarded password is your average user’s go-to; and, if not created with security in mind, can be very problematic. Since users have problem remembering new passwords, even if it’s one that they are able to choose, many users will create obvious passwords that can easily be guessed or hacked.

Conversely, a password (or the passphrase) can be one of the strongest security measures available for your mobile device, as it is important for every mobile user, especially one that has access to business networks, to secure their devices.

The Pattern Lock
The second option we will go over is called a pattern lock. It is the three-by-three swipe-based gesture that unlocks the device. This natural and intuitive lock is very fast, and if all nine dots are used in a pattern, it provides close to 400,000 possible configurations. Pattern lock comes up short in a couple ways. People tend to use shapes that are more easily guessable. It’s also relatively easy to ascertain the password if you watch a user’s hand.

The PIN authentication option is a relatively strong one, as the typical four numeral option has over 10,000 different combinations. Android features the ability to support up to 16 digits. That’s 10 quadrillion different combinations. Of course, not many people are going to be able to remember a 16-digit PIN (and how annoying would it be to have to enter that every time you unlock your phone?). Simple pins are the norm, and therefore not very secure.

The Fingerprint Scanner
This authentication method is now becoming standard on most smartphones and has by-in-large been very popular. It’s secure enough to be trustworthy, and very fast. Moreover, many financial applications utilize the fingerprint as a form of authentication, making the option that much more attractive. The only drawbacks are that sometimes manufacturers will put it in an inconvenient spot on the device and that it doesn’t work with gloves.

Using the Face
All newer smartphones have been taking advantage of facial recognition software. This allows a user to gain access by just glancing at the phone. Since this is an operating system-dependent option, most phones will be getting this option. It may not currently be the most secure option, but as the technology advances, this will be the go-to method for all authentication.

Other Security Measures
Many phones now also offer security features that rely on alternative forms of authentication. On-body detection keeps the device unlocked whenever it is being carried - regardless of who is carrying it. Other options such as having your device unlock when a user says “Okay, Google” is more for convenience than privacy or device security.

What’s the Best Option?
Currently, if you are looking for the most secure and accessible option, your best bet is to use the fingerprint scanner on your phone. Back that up with a five-or-six-digit PIN and you’ll be good to go. In the future, expect the facial recognition software to improve precipitously; and, therefore, be the most secure (and popular) option to get into a mobile device.

What form do you use? Leave your favorite security methods in the comments section below.

How to Properly Assess Your Technology Needs
Tip of the Week: Keeping Track of Your Inventory


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Network Security Google Data Backup Hosted Solutions User Tips Email Mobile Devices Tech Term Hackers Malware VoIp Managed IT Services Cloud Computing Productivity Data Data Recovery Innovation Outsourced IT Microsoft IT Support Communications Communication Internet Efficiency Managed IT Services Hardware IT Services Backup Internet of Things Software Smartphone Smartphones Network Saving Money Business Browser Android BDR Business Continuity Artificial Intelligence Cybersecurity Router Chrome Workplace Tips Windows 10 Small Business Mobile Device Ransomware Business Management How To Cybercrime Gadgets Alert Computer Phishing Information Holiday Two-factor Authentication Word Data Protection Applications Mobile Device Management Data Security Computers Disaster Recovery Spam Office 365 Windows Money Collaboration Server Encryption Facebook Managed IT Managed Service IT Management BYOD Servers Business Intelligence Software as a Service Telephone Systems Settings Private Cloud Wi-Fi Miscellaneous Remote Monitoring Voice over Internet Protocol Save Money Connectivity Social Media Vulnerability Identity Theft Social Engineering Spam Blocking Training Bring Your Own Device Data Breach Mobility Telephony Credit Cards Automation Firewall Virtualization Google Docs Human Resources Sports Infrastructure Access Control Keyboard Virtual Assistant CES Redundancy Fraud Workers Google Drive Botnet Website Comparison Passwords Law Enforcement Password Upgrade Telephone System Content Management Scam IT Plan VPN Paperless Office Unsupported Software Employer-Employee Relationship Value Windows 7 Blockchain Work/Life Balance App Machine Learning Avoiding Downtime Document Management Data Storage Networking Update Compliance Mobile Computing Budget Microsoft Office Apps Operating System OneNote Smartwatch Tools Workforce Flexibility Save Time IBM Warranty Black Market Business Mangement Devices WiFi Flash Data Management Wire Solid State Drive Inventory Evernote Vendor Criminal Addiction Multi-Factor Security MSP Windows 10s Mobile Current Events Password Management Search Engine Downtime Excel webinar Employee Supercomputer Printer Physical Security Gmail Thought Leadership Theft Data loss Camera Audit Display Trending Augmented Reality Smart Tech Professional Services Knowledge Charger NIST Bing Root Cause Analysis Tip of the week Cortana Conferencing Digital Signage Risk Management Unified Threat Management Mouse Recycling Screen Mirroring Staff Smart Office Skype Data Warehousing Authentication Wireless Charging Office Tips Leadership Samsung Security Cameras Cache Sync Content Filtering Electronic Medical Records Remote Worker Public Cloud Help Desk HVAC Amazon Network Congestion Cryptocurrency Shortcuts Windows Server 2008 Google Apps Google Search Entertainment Travel Telecommuting Hiring/Firing Marketing Administrator FENG HBO eWaste Cast Digital Signature Specifications Computer Fan Password Manager Nanotechnology Government Hacker Wireless Internet Information Technology Lifestyle Wiring Practices Amazon Web Services HaaS Cleaning Safe Mode Netflix Accountants Remote Work Microchip Outlook PDF Start Menu Millennials Proactive IT IT Support The Internet of Things Software Tips Big Data Meetings Patch Management HIPAA USB Regulations Recovery Hosted Computing Online Shopping IT Consultant Computer Care File Sharing Social Bandwidth YouTube SaaS Health Enterprise Content Management Frequently Asked Questions Legal Students Unified Communications Managed Service Provider E-Commerce Bata Backup Television Business Technology IoT Company Culture Hacking Battery Strategy Healthcare Loyalty Public Computer VoIP Managing Stress Quick Tips Thank You Safety Instant Messaging Analysis Electronic Health Records Streaming Media Printers Insurance Windows 10 Computer Accessories Congratulations Automobile Proactive Content Filter Rootkit Virtual Private Network Fiber-Optic Business Owner Consultation Bluetooth eCommerce Two Factor Authentication Remote Monitoring and Maintenance Net Neutrality Employer Employee Relationship Vendor Management Storage Regulation Employee/Employer Relationship Education Project Management Cables Worker GDPR Assessment Office Line of Business ISP Utility Computing Twitter

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD