Biometric Products Can Help Cybersecurity

A new report is predicting a significant rise in the use of biometric products, as organisations look to prevent fraud and protect their estate from organised cyber-crime groups.

Fraud, as the report highlights, is a serious problem. In the 2016 Cyber Security Breaches Survey published by the UK government, 65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. 

Sandra Peaston, assistant director of insight at Cifas, says in the report that, “In 2015 Cifas member organisations recorded 170,000 cases of identity fraud. Clearly, the Personally Identifiable Information (PII) that is still the standard (names, address, birthdates, phone numbers etc.) and the ‘what you know' element of the identification/authentication process is in the hands of fraudsters and being exploited.”

The Callcredit Information Group says in its Fraud & Risk Report that while 75 percent of those surveyed have high confidence levels in their ability to prevent fraud, the number masks the obstacles to fraud prevention. Peaston said, “Given this, it's unsurprising that organisations are looking to biometrics to help overcome this problem. If an organisation finds it has two different applications, in two different names, but both accompanied by the same fingerprint (for example), it can easily see that at least one of those applications is highly likely to be fraud.”

It's through fraud, like phishing attacks, that criminals can gain access to a company's network. These are some of the biggest concerns of companies surveyed.

That number can seem impressive, but 29 percent of those surveyed cite a lack of investment in fraud prevention technology by their organisations and 28 percent who highlight a lack of employee education about security threats.
John Cannon, commercial director, fraud & ID, Callcredit Information Group, said in a release: “With cyber-attacks costing UK firms £30 billion in 2016, and with major global breaches reported in the first half of this year, leveraging technological advancements has never been more important for organisations' to instantly verify customers, identify risks, and ultimately stay ahead of the fraudsters.”

The research also found that a majority (74 percent) of organisations are struggling to manage the potential conflict that exists between customer acquisition and the need to validate identities when customers interact with them.

Cannon continued: “By allowing customers to complete document verification online, technology can also help simplify and improve the digital customer experience. Ultimately helping businesses onboard consumers as quickly, cost-effectively and seamlessly as possible.”

SC Magazine

You Might Also Read:

Is The Password Dead?:

Anti-Surveillance Clothing Thwarts Facial Recognition:

 

« Who Is Behind Petya?
WikiLeaks Reveal CIA Credentials Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.