Biometric Products Can Help Cybersecurity

A new report is predicting a significant rise in the use of biometric products, as organisations look to prevent fraud and protect their estate from organised cyber-crime groups.

Fraud, as the report highlights, is a serious problem. In the 2016 Cyber Security Breaches Survey published by the UK government, 65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. 

Sandra Peaston, assistant director of insight at Cifas, says in the report that, “In 2015 Cifas member organisations recorded 170,000 cases of identity fraud. Clearly, the Personally Identifiable Information (PII) that is still the standard (names, address, birthdates, phone numbers etc.) and the ‘what you know' element of the identification/authentication process is in the hands of fraudsters and being exploited.”

The Callcredit Information Group says in its Fraud & Risk Report that while 75 percent of those surveyed have high confidence levels in their ability to prevent fraud, the number masks the obstacles to fraud prevention. Peaston said, “Given this, it's unsurprising that organisations are looking to biometrics to help overcome this problem. If an organisation finds it has two different applications, in two different names, but both accompanied by the same fingerprint (for example), it can easily see that at least one of those applications is highly likely to be fraud.”

It's through fraud, like phishing attacks, that criminals can gain access to a company's network. These are some of the biggest concerns of companies surveyed.

That number can seem impressive, but 29 percent of those surveyed cite a lack of investment in fraud prevention technology by their organisations and 28 percent who highlight a lack of employee education about security threats.
John Cannon, commercial director, fraud & ID, Callcredit Information Group, said in a release: “With cyber-attacks costing UK firms £30 billion in 2016, and with major global breaches reported in the first half of this year, leveraging technological advancements has never been more important for organisations' to instantly verify customers, identify risks, and ultimately stay ahead of the fraudsters.”

The research also found that a majority (74 percent) of organisations are struggling to manage the potential conflict that exists between customer acquisition and the need to validate identities when customers interact with them.

Cannon continued: “By allowing customers to complete document verification online, technology can also help simplify and improve the digital customer experience. Ultimately helping businesses onboard consumers as quickly, cost-effectively and seamlessly as possible.”

SC Magazine

You Might Also Read:

Is The Password Dead?:

Anti-Surveillance Clothing Thwarts Facial Recognition:

 

« Who Is Behind Petya?
WikiLeaks Reveal CIA Credentials Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.