Biometric Products Can Help Cybersecurity

A new report is predicting a significant rise in the use of biometric products, as organisations look to prevent fraud and protect their estate from organised cyber-crime groups.

Fraud, as the report highlights, is a serious problem. In the 2016 Cyber Security Breaches Survey published by the UK government, 65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. 

Sandra Peaston, assistant director of insight at Cifas, says in the report that, “In 2015 Cifas member organisations recorded 170,000 cases of identity fraud. Clearly, the Personally Identifiable Information (PII) that is still the standard (names, address, birthdates, phone numbers etc.) and the ‘what you know' element of the identification/authentication process is in the hands of fraudsters and being exploited.”

The Callcredit Information Group says in its Fraud & Risk Report that while 75 percent of those surveyed have high confidence levels in their ability to prevent fraud, the number masks the obstacles to fraud prevention. Peaston said, “Given this, it's unsurprising that organisations are looking to biometrics to help overcome this problem. If an organisation finds it has two different applications, in two different names, but both accompanied by the same fingerprint (for example), it can easily see that at least one of those applications is highly likely to be fraud.”

It's through fraud, like phishing attacks, that criminals can gain access to a company's network. These are some of the biggest concerns of companies surveyed.

That number can seem impressive, but 29 percent of those surveyed cite a lack of investment in fraud prevention technology by their organisations and 28 percent who highlight a lack of employee education about security threats.
John Cannon, commercial director, fraud & ID, Callcredit Information Group, said in a release: “With cyber-attacks costing UK firms £30 billion in 2016, and with major global breaches reported in the first half of this year, leveraging technological advancements has never been more important for organisations' to instantly verify customers, identify risks, and ultimately stay ahead of the fraudsters.”

The research also found that a majority (74 percent) of organisations are struggling to manage the potential conflict that exists between customer acquisition and the need to validate identities when customers interact with them.

Cannon continued: “By allowing customers to complete document verification online, technology can also help simplify and improve the digital customer experience. Ultimately helping businesses onboard consumers as quickly, cost-effectively and seamlessly as possible.”

SC Magazine

You Might Also Read:

Is The Password Dead?:

Anti-Surveillance Clothing Thwarts Facial Recognition:

 

« Who Is Behind Petya?
WikiLeaks Reveal CIA Credentials Malware »

Directory of Suppliers

E-Tech Computing

E-Tech Computing

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Gekko Technology

Gekko Technology

Gekko is an IT infrastructure solutions provider. We deliver next generation networks to our customers with our GWAN+ solution.

NetworkWorld

NetworkWorld

Network World is an IDG Enterprise brand and the premier provider of news, intelligence and insight for network and IT executives.

BIA

BIA

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

Cyberoam

Cyberoam

Cyberoam offers network security solutions, centralized security management, centralized visibility and granular control into users' activities in business networks

Cyber Security Labs

Cyber Security Labs

Cyber Security Labs is a high-tech startup with a focus on component-based development of high-assurance IT security technology

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

BlackBerry

BlackBerry

A global leader in mobile communications, BlackBerry offers unrivaled security in smartphones and enterprise software solutions.

Cyber Driveware

Cyber Driveware

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Junglemap

Junglemap

Junglemap provide nanolearning training courses on ransomware, information security and GDPR.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.