Preventing Hackers From Accessing Financial Information

Companies are combating sophisticated hackers by utilizing voice biometrics to authenticate customers when they call banks or credit card companies, adding another layer of security to prevent a growing amount of fraud.

As customers find it increasingly vexing to provide not only their username and password and other personal details, companies must balance combatting fraud with providing a less cumbersome experience. A growing number of companies are adopting voice biometrics, where voice and speech patterns are used to identify the individual calling with questions about their account balance or transaction.

"When you contact financial institutions, you already have a problem and you want that issue resolved quickly," said Erica Thomson, a real-time authentication consultant at NICE, a Ra'anana, Israel-based software solutions provider.

Providing your mother's maiden last name or the nickname for your first dog is becoming an obsolete strategy since cyber attackers have already mined social media for the seemingly private information. Thwarting hackers requires staying one step ahead of them.

Voice biometrics is being implemented by many financial institutions such as banks and retirement providers, because it does not require consumers to be physically present or have the software capable of authenticating them through their fingerprint or an iris scan. The technology encompasses an individual's voiceprint of over 100 vocal and personal characteristics with 50% consisting of their physical traits such as their vocal cords, sinuses and lung capacity and the remaining half comprising of their personal tone, pitch and pace when they speak, she said.

Many companies utilize the technology by acquiring a person's voiceprint passively or simply capturing it as the individual inquiries about a transaction and answers questions with a customer service representative. The next time they call to ask about a purchase or a deposit, the company can compare their current voice against the voiceprint, Thomson said. Within seconds, the employee at the bank can determine if the caller's voice matches the voiceprint.

"We've made life easy for fraudsters with social media for many years," she said. "This technology aids financial institutions so they can help their customers quicker and sort out their situations faster."

After a pilot program last year, Citigroup now authenticates a small fraction of its customers who have their branded credit cards by using NICE's voice biometrics technology. As of June, 750,000 customers out of a total of 23.8 million active and inactive accounts can access their accounts by using their voiceprint.

"This is very critical for our customers because it increases their protection," said Andrew Keen, a director in the consumer banking unit at Citigroup. "We are putting the onus on them to prove who they are now."

The feedback from consumers has been positive and Citigroup is still determining whether to use the software for its banking customers.

"Within the first 15 seconds of a customer calling, they are fully authenticated, because it all happens when you tell us why you called," he said. 

How Voice Biometrics Works

Fraudsters have always remained one step ahead and have attempted to circumvent voiceprints by calling unsuspecting consumers and pretending they are from technical support or seeking answers for a survey to record their voices, said Thomson. The hackers want to trick unwary people into saying certain phrases or words and splicing them into new recordings.

The cyber criminals have failed, because this method is "not applicable to real authentications" and they are not fluid conversations, she said. Voice biometrics does not authenticate people by particular words and phrases, so these attempts at phishing are not successful.

"There is no technology today that can make me sound like you," Thomson said.

Voice biometrics operates by judging characteristics such as the pitch and tone of how a person speaks and since consumers will say different things each time they call their bank, simply recording someone's voice is not feasible.

"It is impossible to recreate that voice, and it cannot be engineered," she said. "There are not any mandatory questions, so the technology maintains the integrity and uniqueness of that person's voice."

The biometric system uses "sophisticated algorithms" to match comments made by that person against their previously recorded voiceprints to verify their identity, said Amit Basu, a professor of management information system at the Cox School of Business at Southern Methodist University in Dallas.

The voiceprint utilized by companies are encrypted and only contains a "registry of their characteristics, not the conversation," Thomson said. The technology does not require storing any customer information such as a recording of their voice or social security numbers, increasing security and lowering the odds of fraud occurring.

Computers can capture the uniqueness of each voice and convert the "analog sound waves into a sort of voiceprint or binary image of the sound that your voice makes and various algorithms build this unique 'image' or a biometric vector of your voice," said Jason Braverman, CIO of Hoyos Labs, a New York-based mobile biometric authentication company.

Will Voiceprint Replace Other Bio?

Combining voiceprint with other biometrics such as fingerprint or iris scans will be the most effective approach rather than using it to replace other authentication methods, said Basu.

One advantage is when hackers attempt to replicate a person's voice, that voiceprint is also retained and left behind for comparison. The likelihood that the system mistakenly matches a person's voice is low.

"Overall, there is more chance of false rejection than false acceptance," he said.

In some instances, voice biometrics can completely replace the use of a username and password as long as people enroll again, because voices tend to change with age and weight gains or losses, said Braverman.

Voice biometrics can replace the traditional method of verifying a person for basic account inquires such as when a bill is due. The use of voice biometrics will be an "added layer of authentication" for transactions which pose a higher risk of fraud such as transferring money into another account, said Steve Williams, a vice president of business strategy at Verint Systems, a Melville, NY based software company.

Drawbacks of Voice Biometrics

Noisy environments can hamper the use of the technology but remains a minor issue as both software with smartphones and voice biometrics can minimize or remove background noise, said Thomson.

One of the downside of biometrics is that it cannot be changed easily, said Jason Glassberg, co-founder of Casaba Security, a Redmond, Wash.-based cybersecurity and white hat hacking firm. 

"The true security will depend on the level of sophistication used to match highly precise and detailed voice patterns and guard against pre-recorded sounds," he said. "Nothing is ever 100% safe and even biometric data can be stolen or imitated."

Voice biometrics is not the only solution to preventing hackers from obtaining data, because fraudsters will develop more refined methods, said Thomson.

"Cyber criminals will attempt to enter a network through other channels," she said. "This is what happens with all technology - the fraudsters become more sophisticated. We are always developing solutions to stay ahead of them."

The Street

« IBM Computer To ‘Help’ Accountants
Donald Trump, Hillary Clinton & Russian Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

S21sec

S21sec

S21Sec, Cyber Solutions by Thales, is a leading European cybersecurity pure player, with security experts in Spain and Portugal and an Iberian SOC.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Commonwealth Cybercrime Initiative (CCI)

Commonwealth Cybercrime Initiative (CCI)

The CCI unites 35 international organisations contributing to multidisciplinary programmes in Commonwealth countries. These organisations form the CCI Consortium.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Element

Element

Element is a new type of communications platform. It combines consumer messaging apps, collaboration tools and video conferencing to replace email, address shadow IT and improve security.