Biometric Products Can Help Cybersecurity

A new report is predicting a significant rise in the use of biometric products, as organisations look to prevent fraud and protect their estate from organised cyber-crime groups.

Fraud, as the report highlights, is a serious problem. In the 2016 Cyber Security Breaches Survey published by the UK government, 65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. 

Sandra Peaston, assistant director of insight at Cifas, says in the report that, “In 2015 Cifas member organisations recorded 170,000 cases of identity fraud. Clearly, the Personally Identifiable Information (PII) that is still the standard (names, address, birthdates, phone numbers etc.) and the ‘what you know' element of the identification/authentication process is in the hands of fraudsters and being exploited.”

The Callcredit Information Group says in its Fraud & Risk Report that while 75 percent of those surveyed have high confidence levels in their ability to prevent fraud, the number masks the obstacles to fraud prevention. Peaston said, “Given this, it's unsurprising that organisations are looking to biometrics to help overcome this problem. If an organisation finds it has two different applications, in two different names, but both accompanied by the same fingerprint (for example), it can easily see that at least one of those applications is highly likely to be fraud.”

It's through fraud, like phishing attacks, that criminals can gain access to a company's network. These are some of the biggest concerns of companies surveyed.

That number can seem impressive, but 29 percent of those surveyed cite a lack of investment in fraud prevention technology by their organisations and 28 percent who highlight a lack of employee education about security threats.
John Cannon, commercial director, fraud & ID, Callcredit Information Group, said in a release: “With cyber-attacks costing UK firms £30 billion in 2016, and with major global breaches reported in the first half of this year, leveraging technological advancements has never been more important for organisations' to instantly verify customers, identify risks, and ultimately stay ahead of the fraudsters.”

The research also found that a majority (74 percent) of organisations are struggling to manage the potential conflict that exists between customer acquisition and the need to validate identities when customers interact with them.

Cannon continued: “By allowing customers to complete document verification online, technology can also help simplify and improve the digital customer experience. Ultimately helping businesses onboard consumers as quickly, cost-effectively and seamlessly as possible.”

SC Magazine

You Might Also Read:

Is The Password Dead?:

Anti-Surveillance Clothing Thwarts Facial Recognition:

 

« Who Is Behind Petya?
WikiLeaks Reveal CIA Credentials Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Google Cloud

Google Cloud

Accelerate your digital transformation. Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

Cloudbox

Cloudbox

Cloudbox build and maintain a highly secure, compliant IT infrastructure for our clients – with total peace of mind – so they can focus on the market.