Close Menu
Gossips Today
  • Tech & Innovation
  • Healthcare
  • Personal Finance
  • Lifestyle
  • Travel
  • Business
  • Recipes
What's Hot

In a changed VC landscape, this exec is doubling down on overlooked founders

Kaiser reaches settlement with DOL over alleged mental healthcare access failures

Leggings Are Out for 2026—10 Comfy Pants Stylish Travelers Are Wearing to the Airport Instead, From $25 

Facebook X (Twitter) Instagram
Sunday, February 15
Gossips Today
Facebook X (Twitter) Instagram
  • Tech & Innovation

    In a changed VC landscape, this exec is doubling down on overlooked founders

    February 15, 2026

    ‘Clueless’ -inspired app Alta partners with brand Public School to start integrating styling tools into websites

    February 14, 2026

    Nothing opens its first retail store in India

    February 14, 2026

    The SEC closed its investigation into Fisker

    February 13, 2026

    Waymo is asking DoorDash drivers to shut the doors of its self-driving cars

    February 13, 2026
  • Healthcare

    Kaiser reaches settlement with DOL over alleged mental healthcare access failures

    February 15, 2026

    Lowering drug costs is on Republicans’ minds. Democrats say GOP policies don’t help.

    February 14, 2026

    HHS elevates officials into Kennedy’s inner circle in advance of midterms

    February 14, 2026

    TEFCA, Health Tech Ecosystem are complementary data sharing efforts: officials

    February 13, 2026

    How the generative AI boom changes healthcare cybersecurity

    February 13, 2026
  • Personal Finance

    How to Stop Living Paycheck to Paycheck

    September 10, 2025

    Real Estate Report 2024 – Ramsey

    September 9, 2025

    How Much Car Can I Afford?

    September 9, 2025

    21 Cheap Beach Vacations for 2025

    August 5, 2025

    Car Depreciation: How Much Is Your Car Worth?

    August 4, 2025
  • Lifestyle

    5 Thoughtful Valentine’s Day Add-ons You Can Get in Time

    February 13, 2026

    The Only 4 Ways to Tie a Scarf You’ll Ever Need

    February 10, 2026

    Rare Buck Mason Sale, Plus the Best Winter Deals You Can Still Wear Now

    February 5, 2026

    Begin Again: How I FINALLY Re-Became a Gym Person Last Year at 41

    January 21, 2026

    Begin Again: 50 Short-Term Goal Examples You Can Actually Commit To That Will Change Your Life

    January 20, 2026
  • Travel

    Leggings Are Out for 2026—10 Comfy Pants Stylish Travelers Are Wearing to the Airport Instead, From $25 

    February 15, 2026

    I've Been Visiting Barbados for 5+ Years—and These Are the Caribbean Island's Bars and Restaurants Locals Love

    February 14, 2026

    12 Valentine's Day Gifts I'm Treating Myself to as a Solo Traveler—From $9

    February 14, 2026

    This Is One of the Caribbean’s Smallest Islands—With 200 Shipwrecks, Ancient Volcanoes, and No Crowds

    February 13, 2026

    A Flight Attendant of 45+ Years Shared Her Go-to Carry-on Bag That’ll ‘Last Forever’—and It’s Under $150

    February 13, 2026
  • Business

    Peacock’s new feature lets you sit courtside at the NBA All-Star Game

    February 15, 2026

    With one word, Travis Kelce may have (unintentionally) revealed his retirement plans

    February 14, 2026

    3 research-backed improv tricks to help manage stress

    February 14, 2026

    Wendy’s is closing hundreds of U.S. restaurants as domestic sales slide

    February 13, 2026

    If AI is doing the work, leaders need to redesign jobs

    February 13, 2026
  • Recipes

    miso chicken and rice

    February 11, 2026

    simple crispy pan pizza

    January 20, 2026

    winter cabbage salad with mandarins and cashews

    December 19, 2025

    pumpkin basque cheesecake

    November 25, 2025

    crunchy brown butter baked carrots

    November 19, 2025
Gossips Today
  • Tech & Innovation
  • Healthcare
  • Personal Finance
  • Lifestyle
  • Travel
  • Business
  • Recipes
Business & Entrepreneurship

This common security measure is draining your workforce

gossipstodayBy gossipstodayJanuary 18, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
This common security measure is draining your workforce
Share
Facebook Twitter LinkedIn Pinterest Email

You sit down at your desk, ready to start the day. Before you can even open your first email, you’ve already typed in three different passwords—each more complex than the last. By lunchtime, you’ve repeated the ritual half a dozen times. It’s frustrating, it’s slow, and it’s happening to millions of employees every single day.

This is password fatigue—the silent productivity killer and hidden security risk plaguing modern enterprises. It’s more than an annoyance; it’s a costly vulnerability. Our global survey found that most users still rely on passwords as their primary authentication method. This should concern most organizations, because in an era defined by work-from-everywhere policies, apps, and mobile devices, businesses are still relying on a defense that hasn’t meaningfully evolved since the 1960s.

Complexity Without Security

When it comes to password complexity, organizations are damned if they do and damned if they don’t. They either abandon complexity altogether—look at the Louvre, which used “Louvre” as the password to secure its surveillance system—or require increasingly complex strings of mixed cases, numbers, symbols, frequent changes, and multi-factor authentication (MFA).

While intended to strengthen security, complex password requirements can just as easily have the opposite effect. How many times has someone been locked out of their system for days because they forgot their recovery answer, or lost the phone that sends the authentication link needed to grant access? And in how many instances has that person decided to forsake those approved tools and upload sensitive data into a personal Google Drive—easier for them and their colleagues to access, but also easier for cybercriminals to exploit?

The tragedy is that added complexity doesn’t guarantee safety. Cybercriminals have long since adapted to password advances with credential stuffing and brute-force attacks. But the most effective technique they’re using targets the weakest link in the password chain; not the password itself but the person who created it.

Why spend hours trying to pick a lock when the owner will unknowingly hand you the combination? There have been instances of cybercriminals creating look-alike login pages to collect passwords. The massive data breaches that hit MGM Resorts and Clorox were the result of cybercriminals masquerading as legitimate users, asking the IT help desk to reset their password and MFA. These threat actors didn’t break in—they logged in.

The rise of AI has made the password problem even more urgent. Cybercriminals now use AI to guess passwords, craft flawless phishing emails, and even generate deepfake voices to trick help desk staff. Traditional passwords simply can’t withstand this new generation of attacks.

According to the 2026 RSA ID IQ Report, 69% of organizations reported an identity-related breach in the last three years, a 27-percentage-point increase from last year’s survey. These aren’t abstract statistics—they represent real financial losses, operational disruption, and reputational harm. And in many cases, they could have been prevented.

But how? Employees are burdened with increasingly unmanageable login rituals, yet organizations remain exposed to the very breaches these measures were meant to prevent. So, what’s the answer?

The Passwordless Solution

The most viable way out of this cycle is passwordless authentication. When there’s no password to steal, organizations significantly reduce their risks and streamline the login process by eliminating the need to remember, update, or constantly reenter a password string.

Passwords typically rely on “something you know” for users to gain access. Passwordless authentication replaces typing in a password with two or more other factors, including “something you have” like a mobile phone or hardware token, or “something you are,” like a face or fingerprint scan.

Typically, using those factors manifests in one of three ways, each with its own trade-offs:

Authenticator Apps & Push Notifications:

 What it is: Instead of typing a password, the user enters their username and receives a secure notification on a trusted mobile app asking them to verify the login, often by matching a number.

Pros: Highly popular in business environments; relies on the smartphone the user already carries.

 Cons: Requires the user to have a smartphone with data access; slightly slower than direct biometrics; susceptible to phishing and other attacks.

 Magic Links:

What it is: Similar to the “forgot password” link Instagram or Slack might send you, the system emails a unique link or texts a code to log you in.

Pros: No hardware or setup is required; it works on any device with access to email.

Cons: While “password-free,” this is not truly “passwordless” in the security sense. It relies on the security of the email inbox (which is often protected only by a weak password) and is still susceptible to phishing and interception.

Platform Biometrics (Face ID, Touch ID, Windows Hello):

What it is: The user verifies their identity using a fingerprint scan or facial recognition built directly into their laptop or smartphone.

Pros: This offers the highest convenience and speed; users are already trained to unlock their phones this way.

Cons: It ties the credential to a specific device. If that device is lost or broken, account recovery mechanisms must be robust.

What to Look for in an Enterprise-Grade Passwordless Solution

If you’re evaluating passwordless options for your company, ask yourself these two questions:

1. Is it comprehensive? If your solution only works for one environment or user group, then you’ll need to bolt on additional solutions to cover everyone and everything. For example, a solution might offer seamless biometric login for modern cloud apps like Office 365, but fail completely with legacy on-premises mainframes or VPNs, forcing users to fall back to passwords for critical internal systems.  Your solution must work across every platform, deployment model, and environment—cloud, on-premises, edge, legacy, Microsoft, and macOS.

2. Is it truly secure?  Phishing-resistance is a key trend in passwordless solutions, and it’s a critical feature for  eliminating one of the most frequent and highest-impact attack vectors. But phishing-resistance isn’t enough—organizations also need to be bypass resistant, malware resistant, fraud resistant, and outage resistant. If a cybercriminal can evade passwordless MFA by convincing your IT Help Desk to let them in, then the passwordless method itself isn’t worth all that much.

Making the Transition

Shifting to a different paradigm doesn’t happen overnight, but the payoff is immediate. Start with your most critical applications or highest-risk users and choose device-bound passkeys over synced alternatives that allow keys to roam between devices for stronger security. 

Build rigorous enrollment processes with identity verification and liveness detection, which validates that the biometric source is a live person. In addition, protect your help desk with bilateral verification: this process confirms the caller’s identity via a device prompt and proves the agent’s legitimacy by displaying their verified status on the caller’s screen.

Plan for secure recovery when devices are lost by establishing high-assurance fallbacks, like pre-registered backup keys or biometric re-verification, instead of passwords. Look for solutions that automatically provide device-bound passkeys when users register the app. Lastly, measure the percentage of passwordless authentications over time against any suspected account compromises to ensure your actions are having a positive impact.

By eliminating the daily drain of password fatigue while closing one of the biggest doors to cybercriminals, enterprises can finally reclaim both productivity and peace of mind.

common Draining measure Security workforce
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWho gets to inherit the stars? A space ethicist on what we’re not talking about
Next Article I'm a Flight Attendant, and This Carry-on From Amazon Is My Secret to Fitting a Month's Worth of Clothes in 1 Bag
admin
gossipstoday
  • Website

Related Posts

Peacock’s new feature lets you sit courtside at the NBA All-Star Game

February 15, 2026

With one word, Travis Kelce may have (unintentionally) revealed his retirement plans

February 14, 2026

3 research-backed improv tricks to help manage stress

February 14, 2026
Leave A Reply Cancel Reply

Demo
Trending Now

This Caribbean Island Has 6 National Parks, White-sand Beaches, and a Gorgeous Luxury Resort

Quince's Cashmere Travel Essentials Start at Just $25—Here Are the 10 Pieces I'm Adding to My Wardrobe ASAP

The Elon Musk Act aims to ban ‘special government employees’ from having federal contracts

Location sharing is the latest way to hard launch a relationship

Latest Posts

In a changed VC landscape, this exec is doubling down on overlooked founders

February 15, 2026

Kaiser reaches settlement with DOL over alleged mental healthcare access failures

February 15, 2026

Leggings Are Out for 2026—10 Comfy Pants Stylish Travelers Are Wearing to the Airport Instead, From $25 

February 15, 2026

Subscribe to News

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Advertisement
Demo
Black And Beige Minimalist Elegant Cosmetics Logo (4) (1)
Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

Categories

  • Tech & Innovation
  • Health & Wellness
  • Personal Finance
  • Lifestyle & Productivity

Company

  • About Us
  • Contact Us
  • Advertise With Us

Services

  • Privacy Policy
  • Terms & Conditions
  • Disclaimer

Subscribe to Updates

© 2026 Gossips Today. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.