Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Innovative Technologies are Helping eBay Move Beyond Passwords

These Innovative Technologies are Helping eBay Move Beyond Passwords

Technology continues to grow more advanced, and with it comes major pain points that need to be resolved. Today’s modern businesses will need to adapt by implementing new solutions for both themselves and their customers or clients. In this fashion, eBay has begun to implement an assortment of new features to assist with the customer experience.

The first of these features is called “One Time Password,” which is an initiative that’s attempting to take the “two” out of two-factor authentication. Rather than requiring users to remember a password, eBay wants to send you a confirmation code via SMS that can keep the user logged in indefinitely. The goal is to keep users logged in regardless of how the code was used--allowing those who logged in via a mobile device or desktop more flexibility with their logins.

eBay is also working to allow account authentication through the use of the Touch ID sensor that’s found on more recent Apple devices. The goal is to eliminate the need to remember a password in the first place so that users of Apple products will be able to more efficiently use eBay’s services.

Of course, these services are bound to bring about questions regarding eBay’s motivation for creating such features. Senior Director for Identity and Member Communication Product Management Dave Comer stated: “One Time Password and Touch ID Authentication eliminate the need to remember your password when you want access to the eBay Marketplace... We all use so many applications that require passwords and login information that it is impossible for users to remember them all. We want to eliminate the friction entirely."

eBay’s reasoning might make sense, but does the security hold up on its end of the bargain? Consider how easy it would be to accidentally leave eBay open on an unlocked workstation. Users could fall victim to either lighthearted pranks or financially motivated crimes. Passwords might make things more difficult for the user, but this difficulty is for their benefit. Complex passwords are more difficult to guess, which makes things more difficult for hackers.

In addition to these advancements, eBay plans on increased functionality with Android Wear devices. Users will soon be able to receive notifications on their wearable devices that show them items they may be interested in purchasing. Users will also be able to read and respond to messages through their smart device.

Yet, this presents a similar security problem. Wearable devices have consistently shown that they are less secure than other mobile devices, and much less so than desktop solutions. Unless eBay is implementing other serious security measures, these new features may not be worth the risk.

For the small and medium-sized business, eBay’s technological advancements should resonate. SMBs should be using two-factor authentication whenever possible, such as security systems which utilize a user’s smartphone to deliver an access code when logging into a network. This way, hackers will have a much harder time accessing an account--even if they’ve somehow managed to get a hold of legitimate credentials. Plus, new physical security solutions like pin pads and smart door locks can now be unlocked directly with an employee’s smartphone.

If your business is ready to tackle network security, Total Tech Care can help. To learn more, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Data Recovery Office Server Save Money Windows 10 Passwords Virtualization Gadgets Social Media Saving Money Holiday Tech Term Chrome Managed IT Services Automation Managed Service Microsoft Office Facebook Computers Artificial Intelligence Cybercrime Operating System Internet of Things BYOD Wi-Fi Mobile Device Management Health Networking IT Support Hacking Remote Telephone Systems Information Technology Alert Covid-19 Information Managed Service Provider Spam Office 365 BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router Law Enforcement App History Mobile Computing Data Breach Application Password Human Resources Money Encryption Remote Monitoring Applications Big Data Office Tips Data Storage Training Patch Management Private Cloud VPN Blockchain Managed IT Paperless Office Apps Remote Computing Mobile Office How To Government Avoiding Downtime Flexibility Wireless Marketing Vulnerability WiFi Gmail Windows 7 IT solutions Entertainment Word Website Settings Budget Bring Your Own Device Data Management Servers Work/Life Balance Two-factor Authentication Mouse Infrastructure Data Security Voice over Internet Protocol HaaS Google Drive Risk Management Hacker The Internet of Things Conferencing Lithium-ion battery Scam Vendor Save Time Managed Services Display USB Telephone System Staff Software as a Service Firewall Cleaning Vendor Management Machine Learning Employee/Employer Relationship Virtual Reality Connectivity Remote Work Apple RMM End of Support Social Physical Security Education User Error Safety HIPAA Meetings Sports Redundancy Keyboard Data Protection Workplace Strategy Hiring/Firing Net Neutrality YouTube Biometrics Unified Threat Management Black Market Virtual Desktop Computer Accessories Help Desk Comparison Printing CES DDoS Document Management Solid State Drive SharePoint Wireless Technology Business Technology Business Intelligence Content Management How to Managed Services Provider Downtime Printer Access Control Audit Bluetooth Worker Database Virtual Assistant IT Management Data storage Customer Service Remote Workers Environment Authentication Automobile Botnet IT Plan Processor Fax Server Computing Infrastructure IT Consultant Going Green Unsupported Software Update SaaS Hard Drive Charger Humor Google Docs Battery Compliance Computing Network Congestion Shadow IT Identity Theft OneNote Computer Care Legal eWaste Current Events Internet Exlporer Telephony Samsung Augmented Reality Fraud PDF Digital Signage Value Wearable Technology Retail Hard Drives Remote Worker Spam Blocking Electronic Medical Records Proactive IT Instant Messaging Excel Cryptocurrency Robot Procurement Virus Best Practice Windows 10s Amazon Web Services User Experience Social Network PowerPoint Windows Media Player Mobile Cache Safe Mode Cast Criminal Scalability Investment Emergency Employee/Employer Relationships GDPR Tip of the week Hosted Computing webinar Employees Business Owner Public Cloud Windows 365 Online Shopping Managing Stress Employer Employee Relationship ISP NarrowBand Professional Services Wireless Internet Science File Sharing Assessment Video Conferencing Search ROI Bitcoin Cameras iPhone Shortcuts Camera Windows Server 2008 Inventory Sales Specifications Point of Sale Evernote Personal Cryptomining Tools Wire Television Supply Chain Management Travel Distributed Denial of Service Customer Relationship Management Batteries Files Analyitcs Printers Monitoring Millennials Windows 8.1 Wireless Charging Digitize Chromecast Programming Smart Office Public Computer Windows Server 2008 R2 Transportation Printer Server Colocation Uninterrupted Power Supply Virtual Private Network Regulations Customer relationships Workforce Computer Fan Email Best Practices Cables Rootkit IT Assessment Antivirus Manufacturing Windows 8 Monitor Benefits Managed IT Service IT service Security Cameras Project Management Nanotechnology Workers Computer Tips Telecommuting FENG Virtual CIO Cortana OneDrive Biometric Security Streaming Media Tablet Digital Signature IBM Peripheral Reputation Smart Technology Using Data Domains Tech Support Warranty Flash Digital Security Cameras Content Google Apps Copiers Techology 5G Laptop HVAC Maintenance Software Tips Analysis Supercomputer Quick Tip IaaS Customers Audiobook Smartwatch Bloatware Administrator Sync Devices Emails Ergonomics Enterprise Content Management Development OLED Touchpad Tablets MSP Accountants PCI DSS Consultant Virtual Machine Credit Cards Politics Two Factor Authentication Fiber Optics Analytics Advertising Employee Entrepreneur Microchip Thought Leadership Netflix 2FA Password Management Root Cause Analysis Password Manager Messaging Cabling Shortcut Notifications HBO Knowledge Policy Multi-Factor Security Best Available Music Hypervisor WIndows 7 Trend Micro Cost Management Search Engine Skype Twitter Dark mode NIST Data loss Business Mangement SMS Default App Social Networking Relocation Outlook Smart Tech Leadership Procedure Trending Troubleshooting Saving Time dark theme Amazon Shopping Google Search Start Menu Addiction Screen Mirroring Recycling Loyalty AI Video Games Running Cable IT Infrastructure Books Bing Memory Wiring Frequently Asked Questions Practices FinTech Worker Commute

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code