Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Innovative Technologies are Helping eBay Move Beyond Passwords

These Innovative Technologies are Helping eBay Move Beyond Passwords

Technology continues to grow more advanced, and with it comes major pain points that need to be resolved. Today’s modern businesses will need to adapt by implementing new solutions for both themselves and their customers or clients. In this fashion, eBay has begun to implement an assortment of new features to assist with the customer experience.

The first of these features is called “One Time Password,” which is an initiative that’s attempting to take the “two” out of two-factor authentication. Rather than requiring users to remember a password, eBay wants to send you a confirmation code via SMS that can keep the user logged in indefinitely. The goal is to keep users logged in regardless of how the code was used--allowing those who logged in via a mobile device or desktop more flexibility with their logins.

eBay is also working to allow account authentication through the use of the Touch ID sensor that’s found on more recent Apple devices. The goal is to eliminate the need to remember a password in the first place so that users of Apple products will be able to more efficiently use eBay’s services.

Of course, these services are bound to bring about questions regarding eBay’s motivation for creating such features. Senior Director for Identity and Member Communication Product Management Dave Comer stated: “One Time Password and Touch ID Authentication eliminate the need to remember your password when you want access to the eBay Marketplace... We all use so many applications that require passwords and login information that it is impossible for users to remember them all. We want to eliminate the friction entirely."

eBay’s reasoning might make sense, but does the security hold up on its end of the bargain? Consider how easy it would be to accidentally leave eBay open on an unlocked workstation. Users could fall victim to either lighthearted pranks or financially motivated crimes. Passwords might make things more difficult for the user, but this difficulty is for their benefit. Complex passwords are more difficult to guess, which makes things more difficult for hackers.

In addition to these advancements, eBay plans on increased functionality with Android Wear devices. Users will soon be able to receive notifications on their wearable devices that show them items they may be interested in purchasing. Users will also be able to read and respond to messages through their smart device.

Yet, this presents a similar security problem. Wearable devices have consistently shown that they are less secure than other mobile devices, and much less so than desktop solutions. Unless eBay is implementing other serious security measures, these new features may not be worth the risk.

For the small and medium-sized business, eBay’s technological advancements should resonate. SMBs should be using two-factor authentication whenever possible, such as security systems which utilize a user’s smartphone to deliver an access code when logging into a network. This way, hackers will have a much harder time accessing an account--even if they’ve somehow managed to get a hold of legitimate credentials. Plus, new physical security solutions like pin pads and smart door locks can now be unlocked directly with an employee’s smartphone.

If your business is ready to tackle network security, Total Tech Care can help. To learn more, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Virtualization Social Media Saving Money Holiday Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Facebook Artificial Intelligence Computers Cybercrime Operating System Wi-Fi Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Remote Information Technology Covid-19 Information Spam Managed Service Provider Office 365 Telephone Systems Alert Employer-Employee Relationship Recovery Bandwidth Router BDR Social Engineering Mobility Data Breach Password Money Mobile Computing Human Resources Encryption Application Applications Remote Monitoring Law Enforcement Big Data App History Managed IT Training VPN Apps Blockchain Paperless Office How To Remote Computing Mobile Office Government Data Storage Patch Management Private Cloud Office Tips Bring Your Own Device Flexibility Servers Data Management Gmail Work/Life Balance Marketing WiFi Settings IT solutions Entertainment Website Data Security Budget Two-factor Authentication Google Drive Mouse HaaS Infrastructure Avoiding Downtime Voice over Internet Protocol Vulnerability Windows 7 Word Wireless The Internet of Things Lithium-ion battery Vendor Management Cleaning Vendor Firewall Managed Services End of Support Display USB Education Physical Security Telephone System Staff Virtual Reality Software as a Service Safety Apple Machine Learning Sports HIPAA Employee/Employer Relationship Redundancy Connectivity Social Remote Work Keyboard RMM User Error Meetings Conferencing Scam Risk Management Hacker Save Time Data Protection Workplace Strategy Botnet Net Neutrality Data storage DDoS Automobile IT Plan Unified Threat Management Computer Accessories Help Desk SharePoint Comparison Printing CES Unsupported Software Computing Infrastructure Going Green Customer Service Charger Business Technology Content Management Environment Managed Services Provider Printer Compliance Access Control Fax Server Bluetooth Battery OneNote Database Computer Care Shadow IT Virtual Assistant Current Events Remote Workers Legal Authentication Telephony Samsung SaaS Internet Exlporer Processor IT Consultant Value Network Congestion Update Hard Drive PDF Spam Blocking Electronic Medical Records eWaste Humor Proactive IT Google Docs Computing Hiring/Firing Identity Theft Best Practice YouTube Black Market Wearable Technology Retail Hard Drives Augmented Reality Instant Messaging Fraud Excel Digital Signage Robot Document Management Business Intelligence Solid State Drive Wireless Technology Remote Worker Biometrics How to Audit Downtime Worker Virtual Desktop Cryptocurrency IT Management Procurement Virus Amazon Web Services User Science Social Network PowerPoint Computer Fan Windows Media Player Rootkit Cache Uninterrupted Power Supply Safe Mode Criminal Investment Colocation Employee/Employer Relationships Workers Benefits GDPR Hosted Computing Employees Windows 365 Online Shopping Managing Stress FENG ISP Monitor Distributed Denial of Service Wireless Internet Customer Relationship Management File Sharing Analyitcs Video Conferencing ROI IBM Bitcoin Cameras Shortcuts Smart Technology Camera Inventory Programming Sales Specifications Flash Point of Sale Evernote Personal Cryptomining Reputation Streaming Media Wire Tech Support Supply Chain Management Travel Content Software Tips Supercomputer Batteries Techology Emails Laptop Printers Antivirus Monitoring Millennials Sync Windows 8.1 Wireless Charging Windows 8 Digitize Customers Smart Office IT service Audiobook Windows Server 2008 R2 Printer Server Netflix Touchpad Two Factor Authentication Virtual Private Network Customer relationships Workforce Email Best Practices Cables Tablet IT Assessment Root Cause Analysis Manufacturing Music Domains Politics HBO Advertising Knowledge Managed IT Service Security Cameras Project Management Nanotechnology Computer Tips Telecommuting Skype Maintenance Virtual CIO Cortana OneDrive Data loss Biometric Security IaaS Notifications Troubleshooting Digital Signature Bloatware Peripheral Outlook Leadership Using Data Warranty Digital Security Cameras Start Menu Google Apps Tablets Copiers Screen Mirroring 5G Relocation Loyalty HVAC Books Analysis Entrepreneur Quick Tip Frequently Asked Questions Mobile Video Games Windows 10s Smartwatch Administrator Devices Ergonomics Enterprise Content Management Shortcut Development Worker Commute Cast OLED webinar Emergency MSP Accountants Cost Management PCI DSS Experience Consultant Tip of the week Virtual Machine Credit Cards Professional Services Fiber Optics Scalability Analytics Public Cloud Employee Employer Employee Relationship Microchip Thought Leadership Social Networking 2FA Password Management Password Manager Messaging Business Owner Cabling Assessment NarrowBand Policy Multi-Factor Security Best Available Windows Server 2008 Hypervisor WIndows 7 Tools Trend Micro Search Search Engine Running Cable Twitter Dark mode NIST Business Mangement Memory SMS Default App iPhone Television Smart Tech Procedure Trending Saving Time dark theme Amazon Shopping Google Search Addiction Recycling AI IT Infrastructure Files Public Computer Bing Chromecast Transportation Wiring Practices FinTech Regulations

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code