{"id":11344,"date":"2025-04-30T09:40:44","date_gmt":"2025-04-30T14:40:44","guid":{"rendered":"https:\/\/iqcol.com\/?p=11344"},"modified":"2025-04-30T12:28:03","modified_gmt":"2025-04-30T17:28:03","slug":"autenticacion-resistente-al-phishing-la-evolucion-segura","status":"publish","type":"post","link":"https:\/\/iqcol.com\/en\/autenticacion-resistente-al-phishing-la-evolucion-segura\/","title":{"rendered":"Authentication-Resistant Phishing: The Evolution of Safe Beyond Passwords"},"content":{"rendered":"<p class=\"\" data-start=\"256\" data-end=\"649\">In today&#039;s digital world, traditional passwords are no longer an effective barrier against cyber attacks. The statistics bear this out: the phishing remains one of the most common methods and successful to compromise credentials. In this context, the <strong data-start=\"528\" data-end=\"568\">authentication resistant to phishing<\/strong> emerges as a key innovation to ensure a robust security and moderna.<\/p>\n<h2 data-start=\"651\" data-end=\"703\">What is the authentication resistant to phishing?<\/h2>\n<p class=\"\" data-start=\"705\" data-end=\"1010\">Authentication-resistant phishing is an approach that eliminates the use of passwords as the sole means of verification. Instead, we employ technologies such as <strong data-start=\"868\" data-end=\"921\">passkeys, biometrics, and security keys physical<\/strong> they are designed to not be vulnerable to the spoofing attack (phishing).<\/p>\n<p class=\"\" data-start=\"1012\" data-end=\"1403\">These methods, which follow standard as <strong data-start=\"1054\" data-end=\"1063\">FIDO2<\/strong>allow the authentication process happens safely and without exposing credentials reusable sites or unreliable networks. When using public-key cryptography, the user&#039;s identity is verified locally by using trusted devices, which makes it impossible for an attacker to capture or reuse the credentials.<\/p>\n<h2 data-start=\"1405\" data-end=\"1454\">Advantages of authentication without passwords<\/h2>\n<p class=\"\" data-start=\"1456\" data-end=\"1564\">Adopt this authentication type provides multiple benefits for both organizations and users:<\/p>\n<ol data-start=\"1566\" data-end=\"2595\">\n<li class=\"\" data-start=\"1566\" data-end=\"1788\">\n<p class=\"\" data-start=\"1569\" data-end=\"1788\"><strong data-start=\"1569\" data-end=\"1589\">Better security:<\/strong> By eliminating traditional passwords, it significantly reduces the attack surface. The cryptographic keys are unique for each service and cannot be intercepted or reused.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1793\" data-end=\"2007\">\n<p class=\"\" data-start=\"1796\" data-end=\"2007\"><strong data-start=\"1796\" data-end=\"1830\">Protection against phishing:<\/strong> Even if a user is tricked into visiting a fraudulent site, the passkeys can not be used outside the domain legitimate, which blocks the attempts of impersonation.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2009\" data-end=\"2223\">\n<p class=\"\" data-start=\"2012\" data-end=\"2223\"><strong data-start=\"2012\" data-end=\"2045\">Better user experience:<\/strong> Authentication-resistant phishing is quick and easy. Using a fingerprint or a physical key is more intuitive to remember multiple complex passwords.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2225\" data-end=\"2404\">\n<p class=\"\" data-start=\"2228\" data-end=\"2404\"><strong data-start=\"2228\" data-end=\"2257\">Less support tickets:<\/strong> Many companies spend valuable resources to resolve problems related to forgotten passwords. This approach reduces these operating costs.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2406\" data-end=\"2595\">\n<p class=\"\" data-start=\"2409\" data-end=\"2595\"><strong data-start=\"2409\" data-end=\"2436\">Regulatory compliance:<\/strong> Technologies based on FIDO and the like are aligned with international security standards such as PCI-DSS, which facilitates regulatory compliance.<\/p>\n<\/li>\n<\/ol>\n<h2 data-start=\"2597\" data-end=\"2649\">A great technology, with implementation challenges<\/h2>\n<p class=\"\" data-start=\"2651\" data-end=\"2936\">In the <a class=\"\" href=\"https:\/\/blog.pcisecuritystandards.org\/coffee-with-the-council-podcast-passwords-versus-passkeys-a-discussion-with-the-fido-alliance\" target=\"_new\" rel=\"noopener\" data-start=\"2657\" data-end=\"2852\">podcast of the PCI Security Standards Council with FIDO Alliance<\/a>emphasizes that although the technology is powerful, its adoption must be strategic:<\/p>\n<blockquote data-start=\"2938\" data-end=\"3465\">\n<p class=\"\" data-start=\"2940\" data-end=\"3465\"><em data-start=\"2940\" data-end=\"3465\">\u201cI reiterate that I think that the authentication resistant to phishing is an excellent technology. You can solve many of the problems that we have with passwords. I highly recommend that, when considering the technologies that are going to implement for the authentication, consider the authentication resistant to phishing and its benefits, but also understand that it is a bit different than what people are used to, and discuss how to integrate it properly and safely in your architecture general authentication.\u201d<\/em><\/p>\n<\/blockquote>\n<p class=\"\" data-start=\"3467\" data-end=\"3678\">This means that organizations must understand that this is not \u201creplace password\u201d simply, but of <strong data-start=\"3588\" data-end=\"3634\">redesign your architecture authentication<\/strong> and educate their users and technical teams.<\/p>\n<h2 data-start=\"3680\" data-end=\"3712\">How to start the transition?<\/h2>\n<p class=\"\" data-start=\"3714\" data-end=\"3808\">From IQ Information Quality, we recommend you follow these steps for a successful implementation:<\/p>\n<ul data-start=\"3810\" data-end=\"4417\">\n<li class=\"\" data-start=\"3810\" data-end=\"3917\">\n<p class=\"\" data-start=\"3812\" data-end=\"3917\"><strong data-start=\"3812\" data-end=\"3850\">To assess the current infrastructure:<\/strong> To understand the weak points of the system of current authentication.<\/p>\n<\/li>\n<li class=\"\" data-start=\"3918\" data-end=\"4016\">\n<p class=\"\" data-start=\"3920\" data-end=\"4016\"><strong data-start=\"3920\" data-end=\"3960\">Select supported technologies:<\/strong> Preferably solutions based on FIDO2 and WebAuthn.<\/p>\n<\/li>\n<li class=\"\" data-start=\"4017\" data-end=\"4141\">\n<p class=\"\" data-start=\"4019\" data-end=\"4141\"><strong data-start=\"4019\" data-end=\"4057\">Design a progressive strategy:<\/strong> Gradually integrating methods resistant to phishing along with options inherited.<\/p>\n<\/li>\n<li class=\"\" data-start=\"4142\" data-end=\"4291\">\n<p class=\"\" data-start=\"4144\" data-end=\"4291\"><strong data-start=\"4144\" data-end=\"4170\">Educate users:<\/strong> Adoption is more effective when the users understand the benefits and know how to use the new tools.<\/p>\n<\/li>\n<li class=\"\" data-start=\"4292\" data-end=\"4417\">\n<p class=\"\" data-start=\"4294\" data-end=\"4417\"><strong data-start=\"4294\" data-end=\"4328\">To ensure interoperability:<\/strong> Verify that the solutions chosen to work on different devices and browsers.<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"\" data-start=\"4419\" data-end=\"4433\">Conclusion<\/h3>\n<p class=\"\" data-start=\"4435\" data-end=\"4802\">Authentication-resistant phishing is more than a trend: this is an urgent need in a digital environment is increasingly threatened. Its implementation improves the security, usability, and operational efficiency. But like any innovation, it must be integrated with a strategic vision, considering both the technological architecture as the user experience.<\/p>\n<p class=\"\" data-start=\"4804\" data-end=\"5010\">In <strong data-start=\"4807\" data-end=\"4833\">IQ Information Quality<\/strong>we accompany businesses of all sizes in this process of transformation, helping them to build authentication systems safe, modern, and prepared for the future.<\/p>","protected":false},"excerpt":{"rendered":"<p>En el mundo digital actual, las contrase\u00f1as tradicionales han dejado de ser una barrera efectiva contra los ciberataques. Las estad\u00edsticas lo confirman: el phishing sigue siendo uno de los m\u00e9todos m\u00e1s comunes y exitosos para comprometer credenciales. En este contexto, la autenticaci\u00f3n resistente al phishing surge como una innovaci\u00f3n clave para garantizar una seguridad robusta [&hellip;]<\/p>","protected":false},"author":1,"featured_media":11345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-11344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/posts\/11344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/comments?post=11344"}],"version-history":[{"count":0,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/posts\/11344\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/media\/11345"}],"wp:attachment":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/media?parent=11344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/categories?post=11344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/tags?post=11344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}