What Are Passkeys— And Why Should I Use Them?

by Jon Lober | NOC Technology

Passwords vs. passkeys– is it time you made the switch?

Passwords are the most common method of authentication, but they are also one of the weakest. Often easy to guess or steal, many people use the same password across several accounts. This unfortunate habit leaves a user extremely vulnerable to more serious cyberattacks. 

 

To keep all of your accounts secure via password, you should ideally use a password manager, issue unique passwords for each account, and ensure that each password is long and complex.  In addition, you should also make sure that all your accounts include two-factor authentication (2FA). That said, the data suggests this is an outlandish request of the average human user. 

 

52% of all users reuse their passwords across multiple accounts. 61% of all data breaches involve stolen or hacked login credentials. 

 

Thankfully, in recent years a better solution has emerged—passkeys. Similar word, wildly different security results. Passkeys are more secure than passwords and provide a more convenient way to log into your accounts. 

 

Passkeys have been around for a while, and their influence has slowly strengthened. Through the work of the FIDO Alliance, passkeys have gained support from major players including Apple, Amazon, Google, Mastercard, Microsoft, Visa, and USBank. Making waves across the industry, on May 3, 2023, Google announced that it would its users to completely opt out of passwords in favor of passkeys. 

 

Let’s take a look at this technology and what it means for your business. 

 

What is Passkey Authentication?

Unlike passwords that are reused every time you sign in, passkeys utilize a unique code for each login attempt. The passkey itself is a code created from a combination of information about the user and the device they are using to log in. To actually sign in, this code is sent to and validated by the target server. 

 

Practically this passkey is often a combination of a biometric parameter (like your fingerprint or face) and the device you are using (often your phone). This process works very much like 2FA, except that it removes the password entirely and goes straight to individual validation. Each time you sign in to your account, from your perspective you will simply use a biometric to sign in—just like many of us do with our phones. 

 

This authentication technology leverages Web Authentication (WebAuthn). A core component of FIDO2, this authentication protocol uses public-key cryptography (a special type of encryption) for user verification instead of a unique password. 

 

Advantages of Using Passkeys Instead of Passwords

1. More Secure 

Passkeys are more secure than password and more difficult to hack—especially when the key is a combination of biometric and device data. Since hackers would need both your fingerprint and device’s MAC address or location to penetrate your accounts, a hack is very unlikely. 

 

 

2. More Convenient 

Passkeys are far more convenient than passwords. No more attempting to remember if it had a question mark or a dollar sign at the end! No more trying to hide lists of secret passwords! No more clicking “Forgot your email?” 

 

Forgotten passwords are common and a reset slows an employee down. Each time a person has to reset their password, it takes them an average of three minutes and 46 seconds. Passkeys erase this problem by providing a single code, which you can use across all your accounts. 

 

3. Phishing-Resistant

Credential phishing scams are prevalent and effective. Scammers send emails that (falsely) tell a user that something is wrong with their account. The reset link that takes them to a disguised login page created to steal their username and password. 

 

When a user is authenticating with a passkey instead, this trick will not work on them. Even if a hacker had a user’s password, it would not matter. They would need the device passkey authentication to breach the account. 

 

Are There Any Disadvantages to Using Passkeys?

Passkeys look like the future of authentication technology. However, there are some issues that you may run into when adopting them right now. 

 

Passkeys Aren’t Yet Widely Adopted 

In general, passkeys still are not yet widely adopted, though the news from Google may change all of that quickly. Many websites and cloud services still rely on passwords since they do not have passkey capability yet. 

 

In the meantime, users may have to continue using passwords for some accounts, at least until passkeys become more widely adopted. Until then, it just might be slightly awkward to maintain a mixture of some password-protected and some passkey-protected accounts. 

 

Passkey Account Providers Need Extra Hardware & Software 

The nice thing about passwords is that they are free and easy to use. You simply make them up as you sign up for a site. 

 

Passkeys need some extra hardware and software to generate and validate the codes, which can be costly for businesses to put implement initially. However, the potential savings from improved security and user experience will likely outweigh the cost of passkeys. 

 

Prepare Now for the Future of Authentication

Now is a great time to reflect about how you are going to keep your accounts secure in this wild west moment of tech history. If you’re not sure what steps to take, just remember that technologies like 2FA—and now passkeys—are a simple, and extremely effective first step to take. Our list above is a tiny sample of the businesses that are likely to adopt passkeys soon. Over the coming months, you will likely see many high-profile organizations roll out passkey options. Just take a look at the members of the FIDO Alliance to grasp how significant this shift will be. 

Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
Could your sheltered workshop benefit from grant funding for new technology?
By Jon Lober April 7, 2025
As a sheltered workshop, you play a crucial role in providing meaningful employment opportunities for individuals with disabilities. However, like any organization, securing funding for technology upgrades can be a challenge. While investing in the right tools can improve efficiency, security, and overall productivity—that’s all only if you can afford the tools in the first place.
best office pranks for April Fools 2025
By Jon Lober March 31, 2025
Need April Fools pranks for your office? This list is technically harmless, but great fun. Happy pranking!
More Articles