Data Doctors: Pros and cons of hardware security keys - WTOP News (2024)

Home » Tech News » Data Doctors: Pros and…

Q: What are the pros and cons of using hardware security keys?

A: One of the best ways to secure your online accounts is using some form of two-factor authentication to prevent anyone that acquires your password from getting in.

The two factors are something you know — your password and something you have: your smartphone.

Whenever one of your accounts sees your legitimate password being used from a device, browser or location they don’t recognize, they’ll send a special code or message to your smartphone to make sure it’s you.

With all the clever ways for hackers to steal passwords, not having this feature activated on all your accounts is very risky.

As with all security measures, it’s a balance between protection and usability that each of us must choose between.

Hardware security key pros

As good as smartphone-based two-factor authentication is, it’s not infallible so those seeking a higher level of security often consider using hardware security keys instead.

A couple of advantages of using security keys are they use very strong encryption and require no cellular or Internet connection to work.

They’re using small very durable devices that can live on our keychain and are easy to use, once you’ve set them up on your computing device. They generally use either a USB port or NFC (Near Field Communication) to authenticate.

Many services and devices support their use, so for most situations, they’re compatible.

It can also reduce your chances of being locked out of your accounts if your smartphone is ever lost, stolen, or damaged to the point of being unusable.

Since so many people are using smartphone-based authentication, the bad guys are creating more sophisticated ways to intercept or acquire access codes. Hardware security keys are a really good way to fend off many of those attempts.

Hardware security key cons

Unlike text or app-based security options, there is an initial cost to hardware security keys that range from $25 to $50 for devices such as the YubiKey or Google’s Titan Security key.

It can also be a hindrance if you need to use an alternative Internet device that doesn’t have USB ports or support NFC.

Some non-technical users may find getting them set up comes with a bit of a learning curve or requires some technical assistance.

If you have multiple users of a single account, sharing a key can be a bit impractical.

Just like with your smartphone, if you lose your security key, it can make accessing your accounts difficult unless you’ve set alternative access options as a backup.

Having a backup method for authentication is the single most important thing to do should you decide to start using a hardware security key.

Biometric security

Another option to consider that’s available for most of today’s smartphones, tablets, and laptops is some form of biometric authentication, such as a fingerprint or facial recognition.

They’re particularly common in smartphone financial apps, but you’ll need to go into the settings of each app to activate the option.

Even with biometric access activated, some financial apps will randomly ask you to type your password on occasion to make sure you’re the rightful owner, so be prepared.

Data Doctors: Pros and cons of hardware security keys - WTOP News (7)

Data Doctors: Pros and cons of hardware security keys - WTOP News (2024)

FAQs

Are hardware keys worth it? ›

Hardware security keys are the best, most secure method of MFA. We highly recommend them. But for some, the idea of paying for a key or having to fetch it for every login is too much bother, and that's just fine. What's most important is that you find an MFA scheme that works for you and that you use it.

What is the most secure YubiKey? ›

The YubiKey 5 FIPS certified security keys meet the highest level of assurance (AAL3) of the new NIST SP800-63B guidelines.

Will security keys be the next level of data security? ›

A physical security key is the next level up and replaces security codes. These are little dongles that typically look like thumb drives and connect to your device through a port, over near-field communication (known as NFC) or by showing a code you manually enter.

What happens if you lose your USB security key? ›

What happens if I lose it? When you set up your security key, you also set up backup methods you can use in case you lose your key. These include an authenticator app that lives on your phone, and a set of printed one-time recovery codes.

Is buying a YubiKey worth it? ›

The Yubico Security Key C NFC is the best choice: It's affordable and will work with just about every site that supports security keys. If you're already familiar with security keys and need or want more-advanced features, the Yubico YubiKey 5C NFC is a pricier but worthwhile choice.

How many passkeys can YubiKey hold? ›

A YubiKey 5 Series with firmware 5.7+ can hold up to 100 discoverable credentials (AKA hardware-bound passkeys). Other YubiKey models and configurations might only store up to 32 passkeys. These passkeys are used for secure passwordless authentication via WebAuthn.

How long will a YubiKey last? ›

A Yubikey will essentially last forever, and if you stay clear of the insanity that is Passkeys its Webauthn element can support an infinite number of websites.

What are the risks of YubiKey? ›

The theft scenario is indeed disturbing because if the thief learns your PIN and then steals the Yubikey, you're facing severe problems: the thief can easily check all your passkeys, get access to your accounts, remove all the passkeys and register only the stolen Yubikey, change the password, remove any other 2FA ...

What if someone steals your YubiKey? ›

So, what happens if you lose your YubiKey? In that case, you can still use your Authenticator app (phew!). While you can't create a backup YubiKey, you can always contact Yubico to get a replacement key.

What is the most secure key? ›

The four-sided key is a better choice for maximum security because it can't be easily duplicated. This prevents burglars from attacking homes with this type of key and lock. If you want to make your home more secure, you can change the keys and locks to this type.

How many security keys should I have? ›

Since having two security keys is recommended for added security, with one in use and the other as a backup, choosing a more affordable option could be cost-effective.

What is the difference between hardware keys and passkeys? ›

A security key, or hardware token, is a physical device that provides an additional layer of security during authentication. Unlike passkeys, which are software-based and tied to a user's device, security keys are tangible objects that users physically possess.

Can YubiKey be trusted? ›

Proven security at scale

YubiKeys are trusted by the world's largest companies and users have experienced 0 account takeovers.

Can I use YubiKey for all my passwords? ›

The YubiKey works with Password Safe to protect your passwords using two-factor authentication (2FA). Both a master password and a YubiKey are needed to enable access to your Password Safe file, which contains the usernames, websites, passwords and other information for all of your online accounts.

Can I use a normal USB as a Windows security key? ›

Your administrator or your organization will provide you with a security key if they require it for your work or school account. There are different types of security keys you can use, for example a USB key that you plug in to your device or an NFC key that you tap on an NFC reader.

What are the advantages of hardware security keys? ›

Hardware security key pros

A couple of advantages of using security keys are they use very strong encryption and require no cellular or Internet connection to work. They're using small very durable devices that can live on our keychain and are easy to use, once you've set them up on your computing device.

What are the disadvantages of physical security key? ›

Pros and Cons of Security Keys
AdvantagesDisadvantages
Rely on advanced cryptography to generate unique signatures for authenticationSince security keys are small, they can easily get lost, stolen, or damaged
4 more rows

What does a hardware key do? ›

A hardware security key, also known as a security key, is a physical form of authentication that provides you with access to systems, applications and accounts. Hardware security keys are often used as a second form of authentication or as a Multi-Factor Authentication (MFA) method.

Is YubiKey better than Google Authenticator? ›

Yubikey Authenticator boasts a higher level of security compared to software-based solutions. It can be used across multiple devices and even offers the convenience of passwordless login. However, it does have some drawbacks. Unlike Google Authenticator, Yubikey Authenticator lacks the ability to transfer backups.

Top Articles
Has Bitcoin become less volatile with global acceptance?
Travel insurance | In uncertain times it pays to grab the right cover for your needs.
Hotels Near 6491 Peachtree Industrial Blvd
Umbc Baseball Camp
Plaza Nails Clifton
Free Atm For Emerald Card Near Me
Wild Smile Stapleton
Tx Rrc Drilling Permit Query
Violent Night Showtimes Near Amc Fashion Valley 18
Sport Clip Hours
Koop hier ‘verloren pakketten’, een nieuwe Italiaanse zaak en dit wil je ook even weten - indebuurt Utrecht
Magicseaweed Capitola
Les Schwab Product Code Lookup
7543460065
What is Rumba and How to Dance the Rumba Basic — Duet Dance Studio Chicago | Ballroom Dance in Chicago
Troy Bilt Mower Carburetor Diagram
Lcwc 911 Live Incident List Live Status
Swgoh Blind Characters
Van Buren County Arrests.org
Zack Fairhurst Snapchat
Pokemon Unbound Shiny Stone Location
Keci News
Food Universe Near Me Circular
Pocono Recird Obits
Okc Body Rub
Cookie Clicker Advanced Method Unblocked
Nesb Routing Number
Prey For The Devil Showtimes Near Ontario Luxe Reel Theatre
Craigs List Jonesboro Ar
The Eight of Cups Tarot Card Meaning - The Ultimate Guide
Ou Football Brainiacs
Movies - EPIC Theatres
Tomb Of The Mask Unblocked Games World
UAE 2023 F&B Data Insights: Restaurant Population and Traffic Data
Vadoc Gtlvisitme App
Shaman's Path Puzzle
Chris Provost Daughter Addie
Ket2 Schedule
Personalised Handmade 50th, 60th, 70th, 80th Birthday Card, Sister, Mum, Friend | eBay
Regis Sectional Havertys
Is Arnold Swansinger Married
Lyca Shop Near Me
Craigslist Lakeside Az
Husker Football
Lamp Repair Kansas City Mo
Ladyva Is She Married
Oklahoma City Farm & Garden Craigslist
Top 1,000 Girl Names for Your Baby Girl in 2024 | Pampers
Scott Surratt Salary
8663831604
Generator für Fantasie-Ortsnamen: Finden Sie den perfekten Namen
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5998

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.