Skip to main content
SwiftCase
PlatformSwitchboardFeaturesSolutionsCase StudiesFree ToolsPricingAbout
Book a Demo
SwiftCase

Workflow automation for UK service businesses. Created in the UK.

A Livepoint Solution

Platform

  • Platform Overview
  • Workflow Engine
  • Case Management
  • CRM
  • Document Generation
  • Data Model
  • Integrations
  • Analytics

Switchboard

  • Switchboard Overview
  • Voice AI
  • Chat
  • Email
  • SMS
  • WhatsApp

Features

  • All Features
  • High-Volume Operations
  • Multi-Party Collaboration
  • Contract Renewals
  • Compliance & Audit
  • Pricing
  • Case Studies
  • Customers
  • Why SwiftCase

Company

  • About
  • Our Team
  • Adam Sykes
  • Nik Ellis
  • Implementation
  • 30-Day Pilot
  • Operations Pressure Map
  • For Your Role
  • Peer Clusters
  • Engineering
  • Careers
  • Partners
  • Press
  • Research
  • Tech Radar
  • Blog
  • Contact

Resources

  • Use Cases
  • Software
  • ROI Calculator
  • Pressure Diagnostic
  • Pilot Scope Estimator
  • Board Case Builder
  • Free Tools
  • Guides & Templates
  • FAQ
  • Compare
  • Glossary
  • Best Practices
  • Changelog
  • Help Centre

Legal

  • Privacy
  • Terms
  • Cookies
  • Accessibility

Stay in the loop

Cyber Essentials CertifiedGDPR CompliantUK Data CentresISO 27001 Standards

© 2026 SwiftCase. All rights reserved.

Back to Blog
Security

What are some of the alternatives to passwords?

With the average person juggling multiple digital devices and online accounts, keeping track of, and entering passwords can be a time-consuming.

Dr. Adam Sykes

Dr. Adam Sykes

Founder & CEO

January 11, 2018
4 min read
Contents
  • Fingerprints
  • Facial Recognition
  • Single and temporary passwords.
  • Two-factor authentication
  • Ready to automate your workflows?

With the average person juggling multiple digital devices and onlineaccounts, keeping track of, and entering passwords can be atime-consuming annoyance. But at the same time, as hacking and phishingattacks become more commonplace and sophisticated, leaving your personalinformation unprotected is obviously not an option. What are some of thenew security methods that remove the need to enter a password, but stillkeep your devices and accounts safe?

Fingerprints

Since the release of the iPhone 5s in 2013, Apple has provide the optionof opening your phone with a fingerprint, bypassing the need to enter anumber code or password at all. Since then, Samsung, Sony and HTC haveall followed suit. It is now possible to purchase a stand-alonefingerprint scanner to protect your desktop or laptop.

There are two types of fingerprint scanner, optical and capacitive. Optical scanners are used in smartphones, and work by reflecting light off of the groovesin your finger. The capacitive method uses an electric current from asensor to gain the same information. Capacitive scanners are moreaccurate, and are recommended for high-security purposes.

Facial Recognition

Apple’s Face ID for their iPhone X uses a dual-module sensor, projectinga grid of more than 30,000 infrared dots onto a face, with the othermodule processing the pattern to allow access. A 3D facial map isgenerated and stored in a local, secured area of your phone’s processorfor future reference.

Face ID is considered the most secure of the facial recognition methodson the market today, with reports of Samsung’s facial recognitiontechnology being fooled by a photograph. There are flaws in anyimplementation of this method, though. People with a twin sibling cannotutilise it, and people seeking unauthorised access only have to pointthe device at the owners face in order to gain it.

Single and temporary passwords.

A single and temporary password differs from a standard password in thatit is only to be used once, sent by SMS to a user’s phone, most often inthe form of a Randomly Generated Number (RNG) code. This ensures thatonly the device owner can access an account, making it a safer than theusual security questions for this purpose.

Two-factor authentication

Two-factor authentication is an added layer of security, rather than apassword alternative. It can take the form of a QR or RNG code. If youare serious about your security needs, then this extra precaution issomething to at least consider.

If you’re interested in a powerful and secure business processmanagement platform, with the option of two-factor-authentication. Ifyou’re interested,get in touch with us today, for a free, no-obligation demonstration.


Ready to automate your workflows?

SwiftCase helps operations teams streamline their processes with powerful workflow automation, case management, and AI-powered communication tools.

Book a demo | View pricing | Explore the platform

Related Articles

Security

Mortgage Enquiry Guide

June 4, 20249 min read
Security

Keep Compliant, Keep your Company

December 22, 20216 min read
Security

Imagine giving your clients access to you 24/7

October 18, 20215 min read

Get automation insights delivered

Join operations leaders who get weekly insights on workflow automation and AI.

About the Author

Dr. Adam Sykes
Dr. Adam Sykes

Founder & CEO

Founder & CEO of SwiftCase. PhD in Computational Chemistry. 35+ years programming experience.

View all articles by Adam →

Related Free Tools

GDPR Data Retention Calculator

Check UK GDPR retention periods and deletion dates for 30+ data types.

Try free

FCA Compliance Checker

Free self-assessment across Consumer Duty, complaints, and governance.

Try free

BCP Builder

Build a Business Continuity Plan with guided templates.

Try free

11.8M+ cases processed

Enterprise security, built in

ISO 27001 certified, fully encrypted, and hosted in UK data centres. Your data stays safe.

See Our Security
Book a Demo