Data Doctors: Pros and cons of hardware security keys - WTOP News (2024)

Home » Tech News » Data Doctors: Pros and…

Q: What are the pros and cons of using hardware security keys?

A: One of the best ways to secure your online accounts is using some form of two-factor authentication to prevent anyone that acquires your password from getting in.

The two factors are something you know — your password and something you have: your smartphone.

Whenever one of your accounts sees your legitimate password being used from a device, browser or location they don’t recognize, they’ll send a special code or message to your smartphone to make sure it’s you.

With all the clever ways for hackers to steal passwords, not having this feature activated on all your accounts is very risky.

As with all security measures, it’s a balance between protection and usability that each of us must choose between.

Hardware security key pros

As good as smartphone-based two-factor authentication is, it’s not infallible so those seeking a higher level of security often consider using hardware security keys instead.

A couple of advantages of using security keys are they use very strong encryption and require no cellular or Internet connection to work.

They’re using small very durable devices that can live on our keychain and are easy to use, once you’ve set them up on your computing device. They generally use either a USB port or NFC (Near Field Communication) to authenticate.

Many services and devices support their use, so for most situations, they’re compatible.

It can also reduce your chances of being locked out of your accounts if your smartphone is ever lost, stolen, or damaged to the point of being unusable.

Since so many people are using smartphone-based authentication, the bad guys are creating more sophisticated ways to intercept or acquire access codes. Hardware security keys are a really good way to fend off many of those attempts.

Hardware security key cons

Unlike text or app-based security options, there is an initial cost to hardware security keys that range from $25 to $50 for devices such as the YubiKey or Google’s Titan Security key.

It can also be a hindrance if you need to use an alternative Internet device that doesn’t have USB ports or support NFC.

Some non-technical users may find getting them set up comes with a bit of a learning curve or requires some technical assistance.

If you have multiple users of a single account, sharing a key can be a bit impractical.

Just like with your smartphone, if you lose your security key, it can make accessing your accounts difficult unless you’ve set alternative access options as a backup.

Having a backup method for authentication is the single most important thing to do should you decide to start using a hardware security key.

Biometric security

Another option to consider that’s available for most of today’s smartphones, tablets, and laptops is some form of biometric authentication, such as a fingerprint or facial recognition.

They’re particularly common in smartphone financial apps, but you’ll need to go into the settings of each app to activate the option.

Even with biometric access activated, some financial apps will randomly ask you to type your password on occasion to make sure you’re the rightful owner, so be prepared.

Data Doctors: Pros and cons of hardware security keys - WTOP News (7)

Data Doctors: Pros and cons of hardware security keys - WTOP News (2024)

FAQs

Are hardware keys worth it? ›

Hardware security keys are the best, most secure method of MFA. We highly recommend them. But for some, the idea of paying for a key or having to fetch it for every login is too much bother, and that's just fine. What's most important is that you find an MFA scheme that works for you and that you use it.

What is the most secure YubiKey? ›

The YubiKey 5 FIPS certified security keys meet the highest level of assurance (AAL3) of the new NIST SP800-63B guidelines.

Will security keys be the next level of data security? ›

A physical security key is the next level up and replaces security codes. These are little dongles that typically look like thumb drives and connect to your device through a port, over near-field communication (known as NFC) or by showing a code you manually enter.

What happens if you lose your USB security key? ›

What happens if I lose it? When you set up your security key, you also set up backup methods you can use in case you lose your key. These include an authenticator app that lives on your phone, and a set of printed one-time recovery codes.

Is buying a YubiKey worth it? ›

The Yubico Security Key C NFC is the best choice: It's affordable and will work with just about every site that supports security keys. If you're already familiar with security keys and need or want more-advanced features, the Yubico YubiKey 5C NFC is a pricier but worthwhile choice.

How many passkeys can YubiKey hold? ›

A YubiKey 5 Series with firmware 5.7+ can hold up to 100 discoverable credentials (AKA hardware-bound passkeys). Other YubiKey models and configurations might only store up to 32 passkeys. These passkeys are used for secure passwordless authentication via WebAuthn.

How long will a YubiKey last? ›

A Yubikey will essentially last forever, and if you stay clear of the insanity that is Passkeys its Webauthn element can support an infinite number of websites.

What are the risks of YubiKey? ›

The theft scenario is indeed disturbing because if the thief learns your PIN and then steals the Yubikey, you're facing severe problems: the thief can easily check all your passkeys, get access to your accounts, remove all the passkeys and register only the stolen Yubikey, change the password, remove any other 2FA ...

What if someone steals your YubiKey? ›

So, what happens if you lose your YubiKey? In that case, you can still use your Authenticator app (phew!). While you can't create a backup YubiKey, you can always contact Yubico to get a replacement key.

What is the most secure key? ›

The four-sided key is a better choice for maximum security because it can't be easily duplicated. This prevents burglars from attacking homes with this type of key and lock. If you want to make your home more secure, you can change the keys and locks to this type.

How many security keys should I have? ›

Since having two security keys is recommended for added security, with one in use and the other as a backup, choosing a more affordable option could be cost-effective.

What is the difference between hardware keys and passkeys? ›

A security key, or hardware token, is a physical device that provides an additional layer of security during authentication. Unlike passkeys, which are software-based and tied to a user's device, security keys are tangible objects that users physically possess.

Can YubiKey be trusted? ›

Proven security at scale

YubiKeys are trusted by the world's largest companies and users have experienced 0 account takeovers.

Can I use YubiKey for all my passwords? ›

The YubiKey works with Password Safe to protect your passwords using two-factor authentication (2FA). Both a master password and a YubiKey are needed to enable access to your Password Safe file, which contains the usernames, websites, passwords and other information for all of your online accounts.

Can I use a normal USB as a Windows security key? ›

Your administrator or your organization will provide you with a security key if they require it for your work or school account. There are different types of security keys you can use, for example a USB key that you plug in to your device or an NFC key that you tap on an NFC reader.

What are the advantages of hardware security keys? ›

Hardware security key pros

A couple of advantages of using security keys are they use very strong encryption and require no cellular or Internet connection to work. They're using small very durable devices that can live on our keychain and are easy to use, once you've set them up on your computing device.

What are the disadvantages of physical security key? ›

Pros and Cons of Security Keys
AdvantagesDisadvantages
Rely on advanced cryptography to generate unique signatures for authenticationSince security keys are small, they can easily get lost, stolen, or damaged
4 more rows

What does a hardware key do? ›

A hardware security key, also known as a security key, is a physical form of authentication that provides you with access to systems, applications and accounts. Hardware security keys are often used as a second form of authentication or as a Multi-Factor Authentication (MFA) method.

Is YubiKey better than Google Authenticator? ›

Yubikey Authenticator boasts a higher level of security compared to software-based solutions. It can be used across multiple devices and even offers the convenience of passwordless login. However, it does have some drawbacks. Unlike Google Authenticator, Yubikey Authenticator lacks the ability to transfer backups.

Top Articles
Web3 for the Future: Unveiling the Next Internet Revolution
Cash App’s New High-Yield Savings Earns 4.50% - NerdWallet
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Umbc Baseball Camp
Warren Ohio Craigslist
Usborne Links
Holly Ranch Aussie Farm
Dr Klabzuba Okc
Craigslist Vermillion South Dakota
Canelo Vs Ryder Directv
State Of Illinois Comptroller Salary Database
South Ms Farm Trader
Student Rating Of Teaching Umn
Caroline Cps.powerschool.com
Turbocharged Cars
Bros Movie Wiki
Star Wars: Héros de la Galaxie - le guide des meilleurs personnages en 2024 - Le Blog Allo Paradise
Transfer and Pay with Wells Fargo Online®
Missouri Highway Patrol Crash
Ruben van Bommel: diepgang en doelgerichtheid als wapens, maar (nog) te weinig rendement
Ubg98.Github.io Unblocked
Healthier Homes | Coronavirus Protocol | Stanley Steemer - Stanley Steemer | The Steem Team
18889183540
Terry Bradshaw | Biography, Stats, & Facts
Encyclopaedia Metallum - WikiMili, The Best Wikipedia Reader
Ticket To Paradise Showtimes Near Cinemark Mall Del Norte
2023 Ford Bronco Raptor for sale - Dallas, TX - craigslist
Albertville Memorial Funeral Home Obituaries
Barbie Showtimes Near Lucas Cinemas Albertville
The Monitor Recent Obituaries: All Of The Monitor's Recent Obituaries
Productos para el Cuidado del Cabello Después de un Alisado: Tips y Consejos
Elanco Rebates.com 2022
Nicole Wallace Mother Of Pearl Necklace
Puretalkusa.com/Amac
Where Do They Sell Menudo Near Me
Http://N14.Ultipro.com
Orangetheory Northville Michigan
Cbs Fantasy Mlb
Labyrinth enchantment | PoE Wiki
Tillman Funeral Home Tallahassee
Why I’m Joining Flipboard
Mississippi weather man flees studio during tornado - video
Marcal Paper Products - Nassau Paper Company Ltd. -
Darkglass Electronics The Exponent 500 Test
Workday Latech Edu
Plumfund Reviews
Walmart Listings Near Me
Runescape Death Guard
Sleep Outfitters Springhurst
Sdn Dds
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5998

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.