BID® Daily Newsletter
Dec 7, 2016

BID® Daily Newsletter

Dec 7, 2016

Snowballs and Biometrics


Sometimes things show up unexpectedly. This happened in Siberia in the end of Oct. Along the beach off the Gulf of Ob in Northern Russia, giant snowballs were washing up. They stretched across 11 miles, and ranged in size from as small as a tennis ball to as large as 3 feet across. The press secretary for the Arctic and Antarctic Research Institute calls this a "primary natural phenomenon" with sludge ice, the effects of wind and temperature, and the position on the coastline. Sometimes it takes a natural phenomenon to remind us of the amazing things going on in the world. While not as cool as a giant snowball perhaps, the rise of biometrics in banking is amazing in its own right.
To quickly remind everyone, single factor authentication consists of something you know like a username and a password (or security code). Meanwhile, two factor authentication is based on something you know (like a password/security code) and something you have (like an ATM card or token). Finally, multi factor authentication builds on both of those by incorporating something you know (like a password/security code) with something you have (like an ATM card or token) and something you are (like biometrics including fingerprint, voice, etc.) or even a location (like geo location).
For their part, regulators have long required stronger authentication practices, but they haven't defined precisely how banks should accomplish this. Rather, banks are expected to use robust authentication methods appropriate to the level of risk. However, as technology shifts and crooks continue to press harder, banks are struggling with which authentication methods to choose and how many layers of protection to have. This has become a particular concern when it comes to mobile and online banking activities.
Some banks still rely on passwords alone for account entry, which can be problematic given how insecure passwords can be. Consider that in 2015, words like football, baseball and welcome ranked high on SplashData's top 25 "Worst Passwords" list. Perpetual favorites like 123456 and password ranked at the top. Moreover, according to a 2015 Telesign study, 73% of online accounts use duplicated passwords. As if that weren't bad enough, consider almost half of consumers (47%) rely on a password that hasn't been changed for 5Ys.
To get around the issue of passwords, some banks have taken the approach of requiring a passphrase, which is considered easier to remember than a password and more secure. Still other banks have gone to unique, 1x codes to complete a sign-on.
Still other banks have introduced biometric methods, like retinal scans, facial recognition, voice recognition or fingerprints. Certainly, fingerprint technology has gained traction in the past several years as phones have advanced. Deloitte even predicts there will be 1B smartphones with fingerprint readers in use by the end of next year.
But even fingerprints can be spoofed. Just recently, Kaspersky Lab warned that crooks are already selling skimming devices that they claim can steal fingerprints. This is troubling news for banks that rely exclusively on fingerprints and is likely to gather more regulatory attention here in the US.
As you are trying to determine the best ways to secure your customers' accounts and your own data, remember that security is never completely foolproof. However, multi-layered authentication, encryption and other security methods can add additional levels of protection. After all, no one wants to be standing there with a tennis ball sized snowball in a fight with an aggressor using a 3 foot sized variety.
Subscribe to the BID Daily Newsletter to have it delivered by email daily.

Related Articles:

Facial and Palm Recognition Tech Enhances Biometric Payments
Ongoing advancements in biometrics have added convenience and additional security for consumers and retailers alike. As demand for biometric payment options increases, it gives CFIs another opportunity to provide additional services for business customers.
Identity and Access Management: A Gate Against Internal Threats
Not all cyber threats are external. That’s why it’s imperative to periodically review which employees have access to which systems. We detail best practices of identity and access management.