How FIDO Can Safeguard Against Advanced Cyber Threats

March 3, 2025
Now is the time for organizations to evaluate their authentication strategies proactively.

Recent high-profile security incidents have spotlighted how traditional password-based systems remain vulnerable to attacks. For instance, last year, hackers compromised user accounts at a well-known genetic testing company by employing credential-stuffing techniques, leveraging previously leaked credentials to access sensitive user data. Earlier this year, the threat actor group "Midnight Blizzard" used password spray attacks to breach Microsoft accounts, specifically targeting legacy systems that lack robust multi-factor authentication (MFA). These incidents highlight the ongoing risks posed by weak or reused passwords, particularly in safeguarding personally identifiable information (PII) such as names, phone numbers, and addresses. Even MFA, once touted as a robust security measure, now falls short.

It's clear that traditional password-based authentication places users at risk – and companies can no longer rely on individuals to create and remember complex passwords to keep data safe. Only 34% of Americans regularly update their passwords. While many view one-time passwords (OTPs) – often sent via short message service (SMS) or email for MFA – as a highly secure alternative, they are not immune to phishing and can easily be intercepted. Moreover, the requirement to retrieve and enter OTPs within a limited timeframe can add unnecessary friction, making the authentication process cumbersome and frustrating for users.

Adopting strong authentication methods is essential to counter these escalating risks. Solutions like FIDO (Fast Identity Online) provide the phishing-resistant authentication companies need to reduce reliance on passwords. By embracing FIDO standards, organizations can fortify their defenses and foster greater customer trust amidst the escalating threat landscape.

Breaking Down FIDO

With 51% of passwords reused – and passwords being the root cause of 80% of data breaches – it’s evident that a fundamental shift in our approach to authentication is necessary. This realization led to the establishment of the FIDO Alliance in 2013. The alliance, comprised of major tech companies, government agencies, service providers, financial institutions, and more, aims to improve authentication across websites, apps, and devices.

FIDO authentication, the brainchild of the FIDO Alliance, is pivotal in combating today’s digital threat landscape. The latest FIDO authentication protocol, FIDO2, utilizes public key cryptography to create a unique pair of private and public keys for each user. This approach significantly enhances security while simplifying the user experience. Private keys and biometrics are securely stored on the user’s device, while the public key is sent to the service being accessed, enabling passwordless authentication. Users can authenticate easily with a single fingerprint swipe or a one-time PIN, eliminating complex passwords and relying instead on secure devices, such as biometrics or hardware tokens, that cannot be easily stolen or replicated.

Using strong cryptographic techniques, FIDO2 protects against threats while streamlining the login process. Authentication occurs directly on the hardware key, eliminating the need for push notifications and reducing risks like phishing attacks and push fatigue. The FIDO2 specifications encompass the W3C’s Web Authentication (WebAuthn) protocol and the FIDO Alliance’s Client-to-Authenticator Protocol (CTAP), delivering a seamless authentication experience.

Implementing FIDO Across Organizations

FIDO undoubtedly delivers unparalleled security advantages. However, to truly harness its full potential, organizations should follow a series of essential steps to guarantee a successful rollout:

Assess Current Authentication Methods

Organizations must first thoroughly assess existing password-based systems to identify weaknesses, such as susceptibility to phishing and credential stuffing. This assessment should evaluate the current risks within systems, the vulnerabilities of users accessing them, and the potential impact on the overall environment.

Educating Stakeholders

Next, company-wide education must take priority. Training sessions through webinars or workshops can inform employees and management about the importance of moving away from passwords and the benefits of adopting FIDO.

Select FIDO-Compatible Solutions

With employee buy-in, companies should start actively investigating FIDO-certified solutions, including hardware tokens, biometric systems, and mobile authenticator apps. This is an ideal time to consider next-generation tokens that incorporate true biometrics or PINs – as opposed to previous generations that lack additional authentication measures.

Cost, usability, and integration capabilities must be considered in evaluating these solutions. Companies should also prioritize the portability of these solutions, especially the emerging "syncable" or "multi-device" passkeys that enable users to securely bring their own devices while ensuring seamless functionality across various applications. Hardware passkeys are particularly crucial for high-risk, high-assurance needs, as they can offer strong portability and often combine MFA in a single device with onboard biometrics and passkey support. 

Develop an Implementation Plan

Next, companies must create a clear roadmap for FIDO implementation, detailing specific phases, timelines, and key milestones. This structured approach will facilitate integration and provide a framework for measuring cybersecurity progress. Fortunately, FIDO is compatible with leading browsers and platforms, including Windows 10, Android, iOS, Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari, making implementation seamless.

Gradual Deployment

Finally, organizations should gradually deploy FIDO, starting with the most vulnerable departments or those handling sensitive information. Ongoing technical support and training for all users are crucial, as well as providing resources like FAQs, user guides, and troubleshooting assistance.

Embracing FIDO in 2025 & Beyond

Adopting FIDO standards is essential for organizations aiming to enhance security in a complex cyber threat landscape. Traditional solutions like OTP, MFA, and two-factor authentication no longer provide the level of security, phishing resistance, and compliance necessary to thrive today. By eliminating reliance on traditional password-based systems, FIDO mitigates risks associated with attacks such as phishing, credential stuffing, and malware while improving user experience through secure and convenient authentication methods.

Now is the time for organizations to evaluate their authentication strategies proactively. Waiting for a breach to occur is no longer an option – companies must take steps now to safeguard data and embrace a more secure future with FIDO.

About the Author

Will LaSala | Field CTO at OneSpan

Will LaSala is the Field CTO at OneSpan. He joined the company in 2001 and brings over 25 years of software and cybersecurity experience. Since joining OneSpan, Will has been involved in all aspects of product implementation and market direction within financial institutions.