{"id":92,"date":"2023-09-27T09:58:00","date_gmt":"2023-09-27T09:58:00","guid":{"rendered":"https:\/\/conscia.com\/uk\/?p=92"},"modified":"2025-07-14T09:45:46","modified_gmt":"2025-07-14T09:45:46","slug":"has-the-passwordless-future-finally-arrived","status":"publish","type":"post","link":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/","title":{"rendered":"Has the passwordless future finally arrived?"},"content":{"rendered":"\n\n\n<p class=\" wp-block-paragraph\">It\u2019s an unavoidable fact of modern life that a person\u2019s digital security is tied up in dozens \u2013 potentially hundreds \u2013 of usernames and passwords, across personal and work accounts. We\u2019ve&nbsp;<a href=\"https:\/\/www.itgl.com\/blogs\/improving-staff-password-habits-a-resolution-worth-sticking-with\">written previously<\/a>&nbsp;about the importance of maintaining secure password habits within an organisation, but ultimately even the best passwords imaginable leave much to be desired on the security front. As an organisation, however, you have the potential to dictate the methods of authentication used within your systems. As new authentication approaches gain popularity, has the time finally come to excise passwords from the equation entirely?<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">It wouldn\u2019t be before time. While the methods attackers take to compromise organisational security vary, compromised credentials are a factor in attacks&nbsp;<a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">up to 80% of the time<\/a>. Just this year, we\u2019ve seen multiple high-profile news stories on UK schools being hit by such attacks, resulting in confidential information about students and teachers&nbsp;<a href=\"https:\/\/www.bbc.co.uk\/news\/uk-england-gloucestershire-63637883\">being released onto the dark web<\/a>. Purely credentials-based authentication systems are seen as easy targets to attackers, and an organisation has a responsibility to bolster their authentication security wherever possible \u2013 both for the safety of their systems, and the sensitive data of those they employ.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Unfortunately, any organisation looking to do so will run into the same problem \u2013 namely, the prevalence and familiarity of passwords. Everyone is used to passwords and being expected to use them. It\u2019s because of this ubiquity that most authentication methods work on top of existing credentials-based systems, rather than replacing them entirely and potentially causing significant disruption within the organisation. The most common way of doing so is to ask users for an additional piece of authentication that represents either something the user has (e.g., a dedicated hardware key, or a code generated on or sent to a designated device) or something the user is (biometric data, such as fingerprints or facial recognition). By requiring the user to prove their identity in this way, organisations can help ensure that bad actors aren\u2019t able to access accounts by simply stealing something the user knows (i.e., their password). Instead, they would need to also have access to a physical object, or the user themselves, to pass the additional authentication checks.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">This forms the basis of multi-factor authentication (MFA), which is already common across many online services, and which most people will already be familiar with. Given this familiarity, it\u2019s likely that implementing MFA would cause minimal disruption among an organisation\u2019s users, but it\u2019s important to note that it\u2019s not a \u2018silver bullet\u2019 solution.&nbsp;<a href=\"https:\/\/blog.cloudflare.com\/2022-07-sms-phishing-attacks\/\">A recent attack on Cloudflare<\/a>&nbsp;illustrated how bad actors can still circumvent the more basic authentication factors available in an MFA implementation, in an attempt to gain access to organisational resources. Hardware keys represent the more secure end of the spectrum, being more resilient to attacks but at the same time more disruptive to day-to-day user workflow. These are physical devices that are either directly plugged into the device asking for authentication, or connected to it wirelessly using Bluetooth or NFC. Given their physical nature, hardware keys provide a very effective barrier against attackers who are typically geographically remote, and whose skills are based around digital infiltration rather than physical burglary. Of course, at the same time, the requirement of a physical object means that legitimate users must always have the object to hand, and have the familiarity and confidence to use it on a regular basis \u2013 depending on the organisation and its staff, this can be a tall order.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Then there is also the issue of the myriad different services and accounts that an organisation may require its staff to use on a day-to-day basis, and ensuring that each is similarly secure. In an effort to avoid multiplying numbers of credentials users need to memorise or store securely, organisations may look to simplify matters by implementing single sign-on (SSO) authentication. SSO is another authentication method that\u2019s begun to gain in prominence, particularly among larger organisations. It aims to simplify the log-on process by using a single third-party service provider to handle the authentication process on behalf of multiple different services. Many will be familiar with this process in the form of websites that provide the option to \u2018Sign in with Facebook\u2019 or similar \u2013 essentially allowing the user to access a new service without creating a new set of credentials to go along with it. These providers vary in their suitability for the purpose \u2013 it\u2019s unlikely that a security-conscious organisation would look to use Facebook, but offerings such as Cisco Duo can provide the high levels of security and reliability needed to safeguard sensitive organisational data.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">By using a single provider to manage the credentials for multiple services, the user no longer has to remember or securely store additional credentials outside of those used for the single provider. By the same token, however, it means that if the account with the single provider is compromised, so too are all the services associated with it. For this reason, it\u2019s sensible for SSO to be combined with strong MFA on the single provider, and it\u2019s vital that the provider chosen for this task is suitable, given the security required. If the organisation is in a situation where they can stipulate the use of a single, highly-secure provider, then SSO can be used in conjunction with MFA to provide a unified, highly secure user experience across different systems and services.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Even with these implementations, however, passwords remain at the root of the authentication process, and continue to be insecure and easily stolen \u2013 though their efficacy on their own is dramatically diminished. Recently, there has been a concerted push towards a new authentication method that does away with passwords entirely, called&nbsp;<a href=\"https:\/\/fidoalliance.org\/passkeys\/\">passkeys<\/a>. Unlike passwords, passkeys cannot be stolen through phishing attacks or exposed through data breaches, because in actuality they are a pair of keys \u2013 a private key saved to a device the user has access to, and a public key registered with whichever app or website the account exists with. When a user signs into this account using a passkey, their private key is verified by the public key without ever leaving the user\u2019s device \u2013 meaning it can\u2019t be phished or stolen. The public key, meanwhile, contains no secret information, and is useless unless paired with the private key. As far as the user is concerned, using a passkey is as simple as unlocking their device as usual, be that via fingerprint or passcode, when prompted to do so. Because attackers would require access to both the device and whatever method is used to lock the device, passkeys effectively provide the security of a discrete hardware key contained within a device that the user would ordinarily have with them anyway.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Of course, there are downsides to any authentication method. In the case of passkeys, its relative infancy as a technology poses some issues. Firstly, while passkeys are now supported on all major operating systems, devices that are capable of using passkeys have only become available in the past few years, so users with older devices will be unable to take advantage of the method. This is likely to be a substantial roadblock for any organisation that doesn\u2019t provide its staff with modern work devices. Similarly, the services that offer the use of passkeys are still very limited, and will remain so until devices that do not support the technology eventually age out of common use. Ultimately, then, this means that while there is finally a viable alternative to passwords available for use, it will still be several years until most services offer it as an option. For organisations that provide modern work devices to all employees, and that only require authentication to the few major services that accept them, passkeys may be a viable authentication method that can offer substantial security benefits. In the vast majority of cases, however, a strong MFA implementation remains the most effective way of limiting the vulnerabilities that passwords represent. If your organisation is looking to implement stronger authentication as part of their digital transformation journey, get in touch at&nbsp;<a href=\"mailto:security@itgl.com\">security@itgl.com<\/a>&nbsp;to talk about your options \u2013 as well as how authentication can tie into broader security approaches like network segmentation and Zero Trust.<\/p>\n\n\n\n<div id=\"block_acf-block-686687bbf3dd2\" class=\"profile \">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg\" class=\"profile__thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg 300w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-150x150.jpeg 150w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy.jpeg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t<div class=\"profile__info\">\n\t\t<a href=\"https:\/\/conscia.com\/uk\/profile\/andy-le-grice\/\" class=\"profile__meta\">\n\t\t\t<p class=\"profile__name\">Andy Le Grice<\/p>\n\t\t\t\t\t\t\t<p class=\"profile__title\">Security Practice Lead<\/p>\n\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Passwords remain the weakest link in digital security\u2014frequently compromised, easily phished, and hard to manage at scale. While multi-factor authentication (MFA) and single sign-on (SSO) can dramatically improve protection, many organisations are now looking beyond passwords entirely. Passkeys, a new authentication method based on cryptographic keys, offer a phishing-resistant alternative. Though not yet universally supported, they promise a future of seamless, secure access. Until then, strong MFA and thoughtful implementation of SSO remain the best defence. At ITGL, we help organisations enhance authentication security as part of a wider Zero Trust strategy. Get in touch at\u202fsecurity@itgl.com.<\/p>\n","protected":false},"author":2,"featured_media":93,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[6],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-92","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Has the passwordless future finally arrived? - Conscia UK<\/title>\n<meta name=\"description\" content=\"explore how organisations can move beyond passwords with multi-factor authentication, single sign-on, and emerging passkey technology to strengthen security and reduce credential-based attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Has the passwordless future finally arrived?\" \/>\n<meta property=\"og:description\" content=\"explore how organisations can move beyond passwords with multi-factor authentication, single sign-on, and emerging passkey technology to strengthen security and reduce credential-based attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia UK\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-27T09:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T09:45:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\"},\"headline\":\"Has the passwordless future finally arrived?\",\"datePublished\":\"2023-09-27T09:58:00+00:00\",\"dateModified\":\"2025-07-14T09:45:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/\"},\"wordCount\":1394,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/\",\"url\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/\",\"name\":\"Has the passwordless future finally arrived? - Conscia UK\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg\",\"datePublished\":\"2023-09-27T09:58:00+00:00\",\"dateModified\":\"2025-07-14T09:45:46+00:00\",\"description\":\"explore how organisations can move beyond passwords with multi-factor authentication, single sign-on, and emerging passkey technology to strengthen security and reduce credential-based attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg\",\"width\":1600,\"height\":1068},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Has the passwordless future finally arrived?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/uk\/#website\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"name\":\"Conscia UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/uk\/#organization\",\"name\":\"Conscia UK\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"width\":628,\"height\":628,\"caption\":\"Conscia UK\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/itglconscia-uk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Has the passwordless future finally arrived? - Conscia UK","description":"explore how organisations can move beyond passwords with multi-factor authentication, single sign-on, and emerging passkey technology to strengthen security and reduce credential-based attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/","og_locale":"en_GB","og_type":"article","og_title":"Has the passwordless future finally arrived?","og_description":"explore how organisations can move beyond passwords with multi-factor authentication, single sign-on, and emerging passkey technology to strengthen security and reduce credential-based attacks.","og_url":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/","og_site_name":"Conscia UK","article_published_time":"2023-09-27T09:58:00+00:00","article_modified_time":"2025-07-14T09:45:46+00:00","og_image":[{"width":1600,"height":1068,"url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3"},"headline":"Has the passwordless future finally arrived?","datePublished":"2023-09-27T09:58:00+00:00","dateModified":"2025-07-14T09:45:46+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/"},"wordCount":1394,"commentCount":0,"publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg","articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/","url":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/","name":"Has the passwordless future finally arrived? - Conscia UK","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg","datePublished":"2023-09-27T09:58:00+00:00","dateModified":"2025-07-14T09:45:46+00:00","description":"explore how organisations can move beyond passwords with multi-factor authentication, single sign-on, and emerging passkey technology to strengthen security and reduce credential-based attacks.","breadcrumb":{"@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#primaryimage","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Has-the-passwordless-future-finally-arrived-image.jpg","width":1600,"height":1068},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/uk\/blog\/has-the-passwordless-future-finally-arrived\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Has the passwordless future finally arrived?"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/uk\/#website","url":"https:\/\/conscia.com\/uk\/","name":"Conscia UK","description":"","publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conscia.com\/uk\/#organization","name":"Conscia UK","url":"https:\/\/conscia.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","width":628,"height":628,"caption":"Conscia UK"},"image":{"@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itglconscia-uk\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/92","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/comments?post=92"}],"version-history":[{"count":3,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/92\/revisions"}],"predecessor-version":[{"id":835,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/92\/revisions\/835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media\/93"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media?parent=92"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/categories?post=92"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_solutions?post=92"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_partners?post=92"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_industries?post=92"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_business_outcome?post=92"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_types?post=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}