1-800-270-9034

Google Accelerates Passkey Adoption

Google announced that their Passkeys have been used over 1 billion times since they were introduced in 2022.

By Karla Reffold

Google announced that their Passkeys have been used over 1 billion times since they were introduced in 2022.

Passkeys are a replacement for passwords and other phishable authentication factors. They leverage public-key cryptography and biometrics to create unique digital keys that stay securely on your devices and cannot be guessed, leaked, or phished.

Google has recently accelerated the rollout of passkeys across its products and services. Starting in April 2024, users will be able to create passkeys for their Google Accounts on Android, Chrome, Windows, and macOS. These passkeys can then be used to sign in to Google services without a password. As part of this transition, Google is making it easier for users to migrate from passwords to passkeys on existing accounts.

When you sign in to a service that supports passkeys, your device will generate a unique digital key pair. The private key remains securely stored on your device, while the public key is registered with the service. During future logins, your device uses the private key to prove ownership and authenticate, without ever revealing the key itself.

Passkeys offer several key advantages over traditional passwords:

  1. Immune to phishing and password theft, as there’s no password to steal.
  2. No need to remember complex passwords or use password managers.
  3. Biometrics like fingerprints or facial recognition can be used for added security.
  4. Sync passkeys across devices for seamless access everywhere.

In almost 60% of Surefire Cyber response cases, companies did not have multi-factor authentication (MFA) fully implemented which may have prevented an attack. In 2024 we also noticed an increase in threat actors using techniques to bypass MFA. New authentication methods such as Passkeys and more secure MFA methods are essential for organizations to protect themselves.

Share the Article

Recent Articles

New SIM Swapping Attacks

According to new research, eSIM cards are being hijacked for cyber attacks. eSIM cards are remotely programmable chips that are stored within phones and other wearable devices.

Read More »
Scroll to Top

This website uses cookies to improve your browsing experience. By clicking accept, you consent to the use of cookies. To learn more about the cookies we use, visit our Privacy & Cookie Policy.

Certifications and Credentials

  • AWS Certified Solutions Architect – Associate
  • AWS Cloud Practitioner
  • Cellebrite and Paraben Certified Mobile Examiner
  • Cellebrite Certified Mobile Examiner (CCME)
  • Cellebrite Certified Physical Analyst and Certified Operator
  • Certified Access Data Forensic Analyst
  • Certified E-Discovery Specialist (ACEDS)
  • Certified Forensic Computer Examiner (CFCE)
  • Certified Forensic Examiner-Access Data (ACE)
  • Certified Hard Drive Repair Technician
  • Certified in SANS Windows Forensic Analysis (GCFE)
  • Certified Information Security Manager (Certified by ISACA)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Mac Forensics Analyst
  • Certified Public Accountant
  • Chief Information Security Officer (Certified by EC-Council)
  • Citrix Certified Integration Architect
  • CompTIA A+
  • AWS CompTIA Cybersecurity Analyst (CySA+)
  • CompTIA Linux+
  • CompTIA Linux+ / Linux Professional Institute Certified Linux Administrator (LPIC-1)
  • CompTIA Pentest+
  • CompTIA Cloud+
  • CompTIA Security+
  • Cyber Forensics and Incident Response certificate – Carnegie Mellon
  • Department of Defense Cyber Investigations Training Academy, Computer Forensic Examiner
  • EC-Council Computer Hacking Forensic Investigator Certification (CHFI)
  • EC-Council Computer Hacking Forensic Investigator Certification (CHFI)
  • EnCase Certified Examiner (EnCE)
  • FBI Certified Crisis Management Coordinator
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Forensic Examiner (GCFE)
  • GIAC Advanced Smartphone Forensics (GASF)
  • GIAC Information Security Fundamentals
  • GIAC Security Essentials (GSEC)
  • International Association of Computer Investigation Specialists (IACIS)
  • Licensed Member, California Bar Association
  • Magnet Certified Forensics Examiner (MCFE)
  • Microsoft Certified Professional (MCP)
  • Microsoft Certified Systems Engineer
  • Professional – Information Systems Security Architecture Professional (CISSP-ISSAP)
  • Professional – Information Systems Security Management Professional (CISSP-ISSMP)
  • Senior Professional Human Resources Certification
  • VMware Certified Professional

Report a New Incident

Your incident report has been submitted.