Skip to main content
SwiftCase
PlatformSwitchboardSolutionsCase StudiesPricingAboutContact
Book a Demo
SwiftCase

Workflow automation for UK service businesses. Created in the UK.

A Livepoint Solution

Product

  • Platform
  • Switchboard
  • Pricing
  • Case Studies

Compare

  • vs Salesforce
  • vs ServiceNow
  • vs HubSpot
  • vs Zendesk
  • vs Jira
  • All Comparisons

Company

  • About
  • Careers
  • Partners
  • Press
  • Blog
  • Contact

Resources

  • Guides & Templates
  • FAQ
  • Help Centre
  • Glossary
  • Book a Demo

Legal

  • Privacy
  • Terms
  • Cookies
  • Accessibility
Cyber Essentials CertifiedGDPR CompliantUK Data CentresISO 27001 Standards

© 2025 SwiftCase. All rights reserved.

Back to Blog
Security

What are some of the alternatives to passwords?

With the average person juggling multiple digital devices and online accounts, keeping track of, and entering passwords can be a time-consuming annoyance. But at the same time, as hacking and phish...

Dr. Adam Sykes

Dr. Adam Sykes

Founder & CEO

January 11, 2018
4 min read

With the average person juggling multiple digital devices and onlineaccounts, keeping track of, and entering passwords can be atime-consuming annoyance. But at the same time, as hacking and phishingattacks become more commonplace and sophisticated, leaving your personalinformation unprotected is obviously not an option. What are some of thenew security methods that remove the need to enter a password, but stillkeep your devices and accounts safe?

Fingerprints

Since the release of the iPhone 5s in 2013, Apple has provide the optionof opening your phone with a fingerprint, bypassing the need to enter anumber code or password at all. Since then, Samsung, Sony and HTC haveall followed suit. It is now possible to purchase a stand-alonefingerprint scanner to protect your desktop or laptop.

There are two types of fingerprint scanner, optical and capacitive. Optical scanners are used in smartphones, and work by reflecting light off of the groovesin your finger. The capacitive method uses an electric current from asensor to gain the same information. Capacitive scanners are moreaccurate, and are recommended for high-security purposes.

Facial Recognition

Apple’s Face ID for their iPhone X uses a dual-module sensor, projectinga grid of more than 30,000 infrared dots onto a face, with the othermodule processing the pattern to allow access. A 3D facial map isgenerated and stored in a local, secured area of your phone’s processorfor future reference.

Face ID is considered the most secure of the facial recognition methodson the market today, with reports of Samsung’s facial recognitiontechnology being fooled by a photograph. There are flaws in anyimplementation of this method, though. People with a twin sibling cannotutilise it, and people seeking unauthorised access only have to pointthe device at the owners face in order to gain it.

Single and temporary passwords.

A single and temporary password differs from a standard password in thatit is only to be used once, sent by SMS to a user’s phone, most often inthe form of a Randomly Generated Number (RNG) code. This ensures thatonly the device owner can access an account, making it a safer than theusual security questions for this purpose.

Two-factor authentication

Two-factor authentication is an added layer of security, rather than apassword alternative. It can take the form of a QR or RNG code. If youare serious about your security needs, then this extra precaution issomething to at least consider.

If you’re interested in a powerful and secure business processmanagement platform, with the option of two-factor-authentication. Ifyou’re interested,get in touch with us today, for a free, no-obligation demonstration.


Ready to automate your workflows?

SwiftCase helps operations teams streamline their processes with powerful workflow automation, case management, and AI-powered communication tools.

Book a demo | View pricing | Explore the platform

About the Author

Dr. Adam Sykes
Dr. Adam Sykes

Founder & CEO

Help to Grow: Digital Approved Vendor

Founder & CEO of SwiftCase. PhD in Computational Chemistry. 35+ years programming experience.

View all articles by Adam →

Want to read more?

Check out our other articles on workflow automation and business efficiency.

View All Articles