No Result
View All Result
Register
  • Login
  • Home
  • News
    • All
    • Business
    • Politics
    I was sexually assaulted by an imam. He told me he had supernatural powers

    I was sexually assaulted by an imam. He told me he had supernatural powers

    'Breaking' graphic

    Spygate: Championship play-off final may be delayed by hearing

    Sadia Kabeya, Maddie Feaunati and Lilli Ives Campion

    Women’s Six Nations: England forward trio return for France decider

    How could Labour MPs force a leadership contest and how would it work?

    How could Labour MPs force a leadership contest and how would it work?

    Woman guilty of killing ex-husband in acid attack

    Woman guilty of killing ex-husband in acid attack

    Liverpool manager Arne Slot watches Liverpool's match against Chelsea

    Arne Slot: Liverpool manager says he has ‘every reason to believe’ he will stay at club

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Sports
  • Business
  • Technology
  • Health
  • culture
  • Arts
  • Travel
  • Earth
  • Home
  • News
    • All
    • Business
    • Politics
    I was sexually assaulted by an imam. He told me he had supernatural powers

    I was sexually assaulted by an imam. He told me he had supernatural powers

    'Breaking' graphic

    Spygate: Championship play-off final may be delayed by hearing

    Sadia Kabeya, Maddie Feaunati and Lilli Ives Campion

    Women’s Six Nations: England forward trio return for France decider

    How could Labour MPs force a leadership contest and how would it work?

    How could Labour MPs force a leadership contest and how would it work?

    Woman guilty of killing ex-husband in acid attack

    Woman guilty of killing ex-husband in acid attack

    Liverpool manager Arne Slot watches Liverpool's match against Chelsea

    Arne Slot: Liverpool manager says he has ‘every reason to believe’ he will stay at club

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Sports
  • Business
  • Technology
  • Health
  • culture
  • Arts
  • Travel
  • Earth
No Result
View All Result
No Result
View All Result
Home Technology

UK cyber chiefs say it's time to ditch passwords for passkeys – what are they?

by Liv McMahon
April 24, 2026
in Technology
Reading Time: 4 mins read
0
UK cyber chiefs say it's time to ditch passwords for passkeys - what are they?

Are passkeys the future of online security?

11.6k
VIEWS
Share on FacebookShare on Twitter

The Paradigm Shift in Digital Authentication: Evaluating the NCSC’s Mandate for Passkeys

For decades, the alphanumeric password has served as the primary gatekeeper of the global digital economy. However, as cyber-threat landscapes evolve and the sophistication of credential-based attacks reaches unprecedented levels, the traditional password has transitioned from a security asset to a systemic liability. Recognizing this inflection point, the National Cyber Security Centre (NCSC) has formally pivoted its guidance, advocating for the widespread adoption of passkeys as a superior alternative to traditional password-based systems. This strategic recommendation signals a fundamental shift in how organizations and individuals must approach identity and access management (IAM) in an increasingly volatile digital environment.

The NCSC’s endorsement of passkeys is rooted in the inherent vulnerabilities of “shared secrets.” Traditional passwords require both the user and the service provider to know the same secret. This architecture is fundamentally flawed; if a service provider’s database is compromised, every user’s secret is exposed. Furthermore, human psychology dictates that users often choose memorable, and therefore predictable, strings of characters, or recycle the same credentials across multiple platforms. Passkeys, built on the FIDO2 and WebAuthn standards, eliminate these vulnerabilities by replacing human-memorized strings with robust cryptographic pairings. This transition represents the most significant advancement in consumer and enterprise security since the introduction of multi-factor authentication (MFA).

The Architecture of Resistance: Cryptographic Superiority over Shared Secrets

To understand why the NCSC characterizes passkeys as a definitive upgrade, one must examine the underlying technology. Unlike a password, a passkey is not a string of characters that can be written down, guessed, or intercepted through social engineering. Instead, it utilizes asymmetric cryptography. When a user creates a passkey, their device generates a unique cryptographic key pair: a private key, which remains securely stored on the hardware (such as a smartphone, laptop, or security key), and a public key, which is shared with the service provider.

Authentication occurs when the service provider challenges the device to sign a piece of data using the private key. The user authorizes this action via local biometrics (fingerprint or facial recognition) or a device PIN. Because the private key never leaves the user’s device, there is no “shared secret” for a hacker to steal from a server. Even if a service provider suffers a total data breach, the public keys stored on their servers are useless to an attacker without the corresponding physical devices and biometric unlocks. This architecture effectively neutralizes “credential stuffing” and “brute force” attacks, which remain the leading causes of enterprise data breaches globally.

Organizational Resilience: Mitigating Phishing and Operational Overhead

From a corporate perspective, the move toward passkeys is not merely a technical upgrade but a strategic necessity for risk mitigation. Phishing remains the most prolific vector for initial access in cyberattacks. Traditional MFA, while effective against basic attacks, is increasingly bypassed by sophisticated “adversary-in-the-middle” (AiTM) phishing kits that can intercept one-time codes or session tokens in real-time. Passkeys are inherently resistant to these tactics because the cryptographic handshake is bound to the specific domain of the service. A passkey generated for a legitimate banking site will simply refuse to authenticate on a look-alike phishing site, removing the element of human error from the security equation.

Beyond security, the economic argument for passkeys is compelling. Industry data suggests that a significant percentage of IT helpdesk volume is dedicated to password resets, a process that is both costly and disruptive to productivity. By moving to a passwordless model, organizations can drastically reduce this operational overhead. Furthermore, the friction-reduction provided by biometric authentication enhances the user experience, leading to higher conversion rates for consumer-facing platforms and better compliance with security protocols within internal corporate environments. The NCSC’s guidance highlights that security and usability are no longer a zero-sum game; passkeys offer a rare instance where the more secure option is also the more convenient one.

Navigating the Transition: Interoperability and User Adoption

Despite the clear advantages, the transition to a passkey-centric world is not without its complexities. The primary challenge lies in the legacy infrastructure that still permeates many enterprise environments. Older hardware and outdated operating systems may not support the necessary WebAuthn protocols, requiring a phased approach to implementation. Organizations must conduct thorough audits of their tech stacks to identify “password-only” bottlenecks and develop roadmaps for integration. The role of “Passkey Providers”—such as those integrated into Apple’s iCloud Keychain, Google Password Manager, and Microsoft’s ecosystem,is crucial here, as they allow passkeys to sync across a user’s devices, ensuring they are not locked out if they lose a single phone or laptop.

Furthermore, there is a psychological barrier to overcome. For thirty years, users have been conditioned to believe that a “strong password” is the pinnacle of security. Moving to a system where there is no password to remember requires a fundamental shift in user education. The NCSC emphasizes that clear communication is essential; users need to understand that their biometric data is not being shared with the website, but is merely used locally to “unlock” the cryptographic key. Managing the “account recovery” process also requires a robust strategy. If a user loses all their devices, the methods for regaining access to their digital identity must be secure enough to prevent social engineering, yet accessible enough to prevent permanent data loss.

Concluding Analysis: The Inevitable End of the Password Era

The NCSC’s advocacy for passkeys marks the beginning of the end for the password era. While passwords will likely linger in legacy systems for years to come, the standard for any modern, secure organization has now shifted. The transition to passkeys represents a move away from reactive security,patching holes in a broken system,toward a proactive, “secure-by-design” framework. By leveraging the hardware-backed security of modern devices and the mathematical certainty of public-key cryptography, passkeys address the root cause of the majority of modern cyberattacks.

For business leaders and security professionals, the directive is clear: the status quo is no longer defensible. The technical, economic, and security benefits of passkeys far outweigh the temporary friction of implementation. As the ecosystem matures and interoperability between different platform providers improves, passkeys will become the invisible backbone of a more resilient internet. The NCSC’s intervention serves as a critical catalyst, urging the industry to abandon the fragile, human-dependent security models of the past in favor of a robust, automated, and cryptographic future.

ADVERTISEMENT
Previous Post

Iran-US peace talks fail to reach deal as Washington issues ‘final offer’ | BBC News

Next Post

'I love winning when there is massive competition'

Next Post
George Russell

'I love winning when there is massive competition'

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Home
 
News
 
Sport
 
Business
 
Technology
 
Health
 
Culture
 
Arts
 
Travel
 
Earth
 
Audio
 
Video
 
Live
 
Weather
 
BBC Shop
 
BritBox
Folllow BBC on:
Terms of Use   Subscription Terms   About the BBC   Privacy Policy   Cookies    Accessibility Help    Contact the BBC    Advertise with us  
Do not share or sell my info BBC.com Help & FAQs   Content Index
Set Preferred Source
Copyright 2026 BBC. All rights reserved. The BBC is not responsible for the content of external sites. Read about our approach to external linking.
  • About
  • Advertise
  • Privacy & Policy
  • Contact
  • Arts
  • Sports
  • Travel
  • Health
  • Politics
  • Business
Follow BBC on:

Terms of Use  Subscription Terms  About the BBC   Privacy Policy   Cookies   Accessibility Help   Contact the BBC Advertise with us   Do not share or sell my info BBC.com Help & FAQs  Content Index

Set Preferred Source

Copyright 2026 BBC. All rights reserved. The BBC is not responsible for the content of external sites. Read about our approach to external linking.

 

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Arts
  • Sports
  • Travel
  • Health
  • Privacy Policy
  • Business
  • Politics

© 2026 The BBC is not responsible for the content of external sites. - Read about our approach to external linking. BBC.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.