Biometric Products Can Help Cybersecurity

A new report is predicting a significant rise in the use of biometric products, as organisations look to prevent fraud and protect their estate from organised cyber-crime groups.

Fraud, as the report highlights, is a serious problem. In the 2016 Cyber Security Breaches Survey published by the UK government, 65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. 

Sandra Peaston, assistant director of insight at Cifas, says in the report that, “In 2015 Cifas member organisations recorded 170,000 cases of identity fraud. Clearly, the Personally Identifiable Information (PII) that is still the standard (names, address, birthdates, phone numbers etc.) and the ‘what you know' element of the identification/authentication process is in the hands of fraudsters and being exploited.”

The Callcredit Information Group says in its Fraud & Risk Report that while 75 percent of those surveyed have high confidence levels in their ability to prevent fraud, the number masks the obstacles to fraud prevention. Peaston said, “Given this, it's unsurprising that organisations are looking to biometrics to help overcome this problem. If an organisation finds it has two different applications, in two different names, but both accompanied by the same fingerprint (for example), it can easily see that at least one of those applications is highly likely to be fraud.”

It's through fraud, like phishing attacks, that criminals can gain access to a company's network. These are some of the biggest concerns of companies surveyed.

That number can seem impressive, but 29 percent of those surveyed cite a lack of investment in fraud prevention technology by their organisations and 28 percent who highlight a lack of employee education about security threats.
John Cannon, commercial director, fraud & ID, Callcredit Information Group, said in a release: “With cyber-attacks costing UK firms £30 billion in 2016, and with major global breaches reported in the first half of this year, leveraging technological advancements has never been more important for organisations' to instantly verify customers, identify risks, and ultimately stay ahead of the fraudsters.”

The research also found that a majority (74 percent) of organisations are struggling to manage the potential conflict that exists between customer acquisition and the need to validate identities when customers interact with them.

Cannon continued: “By allowing customers to complete document verification online, technology can also help simplify and improve the digital customer experience. Ultimately helping businesses onboard consumers as quickly, cost-effectively and seamlessly as possible.”

SC Magazine

You Might Also Read:

Is The Password Dead?:

Anti-Surveillance Clothing Thwarts Facial Recognition:

 

« Who Is Behind Petya?
WikiLeaks Reveal CIA Credentials Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

CYSEC Academy

CYSEC Academy

CYSEC Academy offer cyber certifications, cyber assurance and cyber defense training, hands-on learning training modules, public, private and bespoke training courses.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

Nubeva Technologies

Nubeva Technologies

Nubeva provide a breakthrough TLS Decrypt solution with Symmetric Key Intercept to gain the visibility needed to monitor and secure network traffic.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

CyberPion

CyberPion

Cyberpion’s groundbreaking platform enables security teams to identify and neutralize threats stemming from vulnerabilities within online assets throughout an enterprise’s ecosystem.

Black Cybersecurity Association (BCA)

Black Cybersecurity Association (BCA)

Black Cybersecurity Association is an inclusive non-profit organization focused on community, and career mentorship for underrepresented minorities in the cybersecurity industry.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.