tigrisnet

Do Complicated Passwords Help Us Be More Secure?

We use passwords everywhere these days, not just on our computers but the various electronic devices and the endless accounts we seem to accumulate. With increased security measures on many websites and accounts to try to protect our sensitive data, we are being asked increasingly to create complex passwords, but are we benefiting? Where did passwords come from? Passwords have been around in one form or another for centuries. Its thought that the Roman military used passwords to distinguish friend from foe and there are documented uses of cyphers throughout history.  However, the first use of passwords for computers happened in 1960at MIT. Fernando Corbato developed the password as a way to protect individual files from being accessed by other people on a compatible Time-Sharing System (CTSS) that several researchers had access to. Until the 90’s when the World Wide Web boom happened the need for computer passwords was not a significant issue. Suddenly there needed to be a way to protect the increasing volume of sensitive data that was being collected about people. When did passwords become complex? In 2003 the US National Institute of standards and Technology (NIST) released an official guidance that was written by an engineer named Bill Burr. This guidance is the basis on which password requirements are dictated. In his 8 page document Burr outlined the need for passwords to have mix of lower and uppercase, use of numbers and special characters and even that passwords should be of minimum length. He also advised that passwords should be changed regularly. Did it improve security? Well there is no doubt that longer more complex passwords are better choice than short easy to guess passwords. There are draw backs to using long passwords. Due to limitations of human memory the ability to recall a long string of letters and numbers can be difficult, which leads most people to either write them down, creating a security issue itself, or they often use the same password to access all their accounts. The problem is that if a hacker guesses the password then they have access to every account. Yet this is still a very common problem. Due to the large number of accounts a person holds they would struggle to create and remember a unique strong complex password for each they create an easy to remember password, which would be fine except that so many people think similarly and use the same password. Research has shown that globally the most popular password is ‘123456’. So the concept was promising but the problem was that most people didn’t understand the reasoning and so just didn’t follow guidance when creating the password and instead opted for convenience. What is the advice now? In 2017 NIST overhauled their advice document completely and now actually recommend the use of passphrases that are much harder to guess than a string of non-sense characters that can be more easily decoded by a computer. So using a string of unrelated words will give you better security on your accounts. Although the current trend is moving to using 2-step authentication by way of password and biometric which will see security improved while maintaining the convenience. NIST also no longer recommend||| that passwords should be changed regularly and instead advise that only done so should there be a need e.g. a breach occurs.

Do Complicated Passwords Help Us Be More Secure? Read More »

How Apps Can Help Our Productivity

With our very busy and noisy world, today achieving high productivity can be difficult. The level of distractions that follow us by way of our devices can be a hindrance. At the same time they can provide us with tools that if we use in the correct way will help us. With the current dramatic shift in working patterns due to the pandemic has meant many more people are working from home. So using some of the solutions below will allow for a more collaborative and cohesive remote working setting to exist between employees of companies and their clients.   Project management There are many benefits of using a project management software/app. Modern-day the availability and choice of software available is vast and greatly welcomed by many who have made the leap from the paper and pen planning days. We can explore some of the general benefits to organisations by using this type of software; Project Planning – by allowing scheduling of tasks, defining key role requirements, and marking the project milestones that would form the project timeline will allow for a much more efficient flow. Resource management is a very important consideration in project management. The effective use of resources, not just which resources are required but the timing of their need, availability or utilisations will affect the efficiency. Forecasting – when the overview of resource allocation and timeline can be seen, efforts can be made to prevent potential bottlenecks when multiple projects or streams of projects are running. Budget management is one of the factors that can be the difference between a successful or failed project. Decisions can more easily and quickly be made to avoid overspending on projects when all the time and cost information is available Communication both internal and external can happen in one place and so everyone involved can follow the conversation. Leaving less chance that key people get left out of the conversation or that information does not reach the right target. Some examples of project management apps/software include; Asana – “designed to improve team collaboration and work management. It helps teams manage projects and tasks in one tool. Teams can create projects, assign work to teammates, specify deadlines, and communicate about tasks directly in Asana. It also includes reporting tools, file attachments, calendars, and more” Monday “is a project management tool[2] that enables organizations to manage tasks, projects, and team work.The platform\’s capabilities include more than 100 prebuilt automation recipes and over 50 integrations with other work apps” Time Tracking apps These types of apps bring great benefit to any type of work set up, whether it is a sole person looking to accurately track their working hours or a company that wants to ensure their staff are working in the most optimal way to achieve the best results. When working time is tracked then it can be easier to determine project timelines by using the information available on previous tasks. The apps can provide a greater level of transparency to employers or even clients on how the time was used. Also increasing the billing accuracy, so charges are only made for relevant work time. There are many of such time tracking apps that have varying features and costs. To give some examples; Everhour “is a team-oriented time tracking software. Harvest “offers time tracking, invoicing, expense tracking, and time-based reporting” Cloud Document Sharing With advancing technology and increasing image resolutions and file sizes it\’s often that files cannot be shared by emails. So the existence of Cloud storage services that allow for files to be shared, edited, and stored has proven to be highly valuable. Not only that but the changing work culture, where increasingly people are working remotely allows them to have access to their files from anywhere with internet connection. The same document can be worked on by multiple persons at different locations to each contribute their part without needing to have multiple copies of the same document. Google Drive “is a file storage and synchronization service that allows users to store files on their servers, synchronize files across devices, and share files. very widely used service and highly reliable. Sharepoint “document management and storage system, but the product is highly configurable and usage varies” All softwares/Apps mentioned are just a handful among many more that carry out similar functions. The decision of which to use is largely user preference to how intuitive they find the software to be. Software integrations is also a consideration for organisations that want to create a more seamless flow in their productivity.

How Apps Can Help Our Productivity Read More »

Regulations of Biometric Data for Use in Security

With the increasing popularity of biometric technology in security, companies are moving towards the use of it rather than the more traditional forms. It offers businesses flexibility and enables them to streamline their authentication processes. Biometric security provides a more robust and advanced level of security over traditional forms. It’s important to consider the regulations around the use of such technology and how the data is processed and stored in terms of data privacy laws. With over 120 of the world countries having some sort of data privacy laws but not many speak specifically about biometrics. With some countries, such as Germany, having much stricter privacy laws than others. Are there UK Biometric Laws? There is no single law that specifically governs the collections and storage of Biometric data in the UK, there are a number of laws that legislate on data privacy and include Biometric data. The Information Commissioners Office (ICO) is a government body that is responsible for regulating data privacy issues. The ICO sets out a code of practice but is not a legal act itself. The practical advice that is offered will help organisations comply with the legal framework. In the UK, the  the Protection of Freedom Act 2012 is one that regulates the use of biometrics in two specific instances. It stipulates that Police are unable to retain DNA and fingerprint data, collect from people not convicted of a crime. It also states that schools using Biometrics can only enrol students with consent of both arent and Child, and it includes any type of biometric data. Classification of Biometric Data Biometric data that is used to identify an individual it is designated as ‘sensitive data’ under data privacy laws and so must be treated with particular care and under stricter regulations. The ICO provides guidance on, what it calls, “special data category”. There are several forms of personal data included under this category but the relevant aspect is that it includes Biometric data where it’s used for identification purposes. Under GDPR biometric data is classified as personal data  and its processing requires explicit consent as well as lawful basis. There is an obligation for organisations to consider whether in fact, they need the data and how it will be kept securely. What are the considerations? Organisations crucially need to have lawful basis to process personal data but they also need to be certain weather they need it. Points to consider; Why is the data being collected? What will be done with it? Where will it be stored? Who will have access to it? How will it be secured? Its also important to determine whether the data needed for the identity verification is more sensitive that the information it gives users access to. If this is the case a less rigorous authentication process would be more suited. To carry out a data protection impact assessment (DPIA) will set out the details and considerations and so allowing for an informed decision weather or not the implementation of Biometric system is the way forward. With the biometric technologies booming in the current pandemic the use of non contact authentication is sure to be further adopted by companies worldwide, to overcome health risk concerns. Using biometric authentication will also allow for more remote working in some sectors where security is of the most paramount importance.

Regulations of Biometric Data for Use in Security Read More »

What Are The CCTV Regulations In the UK for Commercial Businesses?

The use of CCTV for security measure in the workplace can be highly beneficial as a deterrent for criminal activity. For some there may be a concern around the legal responsibility and considerations for the use of CCTV by businesses, which does need to be explored by each business to determine the benefits and suitability of security and surveillance systems.   How is CCTV governed? It is important to know that GDPR laws cover images captured by CCTV and so steps must be taken to ensure the organisation is compliant. The Information Commissioners Office (ICO) is a government body that is responsible for regulating data privacy issues. The ICO sets out a code of practice but is not a legal act itself. The practical advice that is offered will help organisations comply with the legal framework. The Surveillance Camera Commissioner’s Office (SCCO) also issues a code of practice that details the legal obligations for CCTV users and again like ICO is not an act itself but is an officially-sanctioned document.   The legal framework that the ICO and SCCO draw on to create the code of practice is based on 4 aspects of law;   The Data Protection Act (DPA), which regulates how personal data can be processed and moved, and how it must be protected. The Freedom of Information Act (FOI), which regulates access to information held by public authorities The Protection of Freedoms Act (POFA), which regulates (among others) how surveillance and biometric data can be used, and how these types of data must be safeguarded. The Human Rights Act (HRA), which includes provisions regarding the right to privacy Rules on CCTV There are several points to consider when looking to decide if a business requires a surveillance security system:   Consider if it necessary to use CCTV and what needs to be recorded? Register with ICO Appoint a data controller to be responsible for the storage, processing and review of data Perform Privacy impact assessment (PIA) Inform all employees that they are being recorded and provide clear signage Ensure areas of expected privacy, eg toilets and changing rooms are not included in surveillance areas. Subjects of CCTV data can ask for any personal data that has been collected, which must then be provided to them within a reasonable time frame. Comply with any requests to supply CCTV data for Legal proceedings Benefits of compliance with regulations/Laws There are benefits for businesses that work to comply with the laws that govern use of CCTV in commercial setting; Allows for security infrastructure to be optimised as the legal framework looks to strike a balance between privacy and security The organisation will be protected by authorities when data is held in accordance with DPA should any issue arise regarding the data held. Internal documentation that is required to be maintained will allow for a continually refined and strengthened security strategy. Breaches in compliance carry a heavy legal consequence, with more serious breaches resulting in £500,000 penalties and even custodial sentences. Who is responsible for the data? A business that hold personal data is required to appoint a Data controller who is legally responsible for the data. They decide what data is processed, the reason and manner. They don’t necessarily carry out surveillance or processing themselves. The data controller can be an individual, organisation or any other corporate or unincorporated bodies of persons. The Guarding the data is the legal responsibility of businesses and so data must be stored securely and only accessed by authorised personnel. A business must also be able to show an audit trail of how the data is collected and kept. Once the data is no longer needed, it must also be disposed of in a way that it would be impossible to recover. How long can data be kept? Data should only be stored for as long as legitimately needed. No specific duration is defined for keeping data, and that is likely to vary depending on the circumstance that the data is collected. For example, a restaurant is likely to only need CCTV footage for a few hours while a hotel corridor perhaps a few days. The legislation related to surveillance equipment aims to strike a balance between security and privacy by giving the CCTV users means to protect staff and assets without compromising basic human right to privacy. Having a well planned and efficient CCTV will bring benefits to a business. If you would like more information or to discuss your requirements, you can contact Arana Security, here.

What Are The CCTV Regulations In the UK for Commercial Businesses? Read More »

Cloud Services: What Are They & What Are The Benefits?

Why the “Cloud”? The term “Cloud” has been used for several decades in relation to IT. Originally it was used within old telecom network schematics to refer to parts that were just not relevant to go into details over, so it was represented as a cloud image. Cloud computing as a term became popular in the early 2000s to describe the services offered that allowed for on-demand IT resource delivery over the internet. However, the concept of providing computing as a service has been around since the 1960s.   What are Cloud Services? Cloud computing services include a range of on-demand services provided over the internet to companies and customers without them having to own the computing infrastructure or data centres. Instead of having to run programs and software that are physically on their computers or servers, companies can have affordable access to flexible resources without the complexity and expense, by paying for what they use. The computing essentially happens on remote serves (cloud servers), and the data collected is also stored remotely. The cloud service providers are also able to benefit from significant economies of scale by delivering the services to a range of customers. The services that are offered as cloud services include;   Servers Databases Storage Networking Software Analytics   Cloud computing services can be generally divided into three categories;   1) Infrastructure as a Service (IaaS): providing access to essential infrastructures such as servers, network components, and storage. E.g. Amazon web services   2) Platform as a Service (PaaS):  used by developers to develop, test, maintain software. It was created to support the whole application life cycle. E.g. OpenShift   3) Software as a Service (SaaS): giving access to applications and software through subscriptions over the internet. E.g. Microsoft 365   What are the benefits of cloud services? Cloud services have become very popular and increasingly adopted by companies and customers due to the benefits that they can bring;   Reduce costs Companies don’t need to purchase and maintain costly equipment for their IT needs as well as not requiring a large IT team. With an increasing number of cloud service providers, the competition is higher, and so prices for cloud storage will fall at the same time as storage capacity increases.   Faster IT equipment Computer memory and power of individual computers are freed up by the use of cloud services, as software and data are not stored on the device.   Data Security Often the biggest concern for people, but cloud service providers will offer advanced data security features. Data that is processed by cloud storage providers will implement authentication, access control and encryption. Combined with the organisation’s security measures will protect sensitive data.   Data recovery When data is stored in the cloud it can be recovered should there be a problem with the hardware. Even destruction of on-site systems through any means, the data is all easily accessed with any device connected to the internet.   Business scale Cloud services give organisations the flexibility to easily and quickly scale up/down IT requirements depending on their business needs.   On-the-go working When resources are in the cloud, they are stored, retrieved, recovered or processed with a couple of clicks. Access to works is available 24/7 and anywhere with internet on smartphones and devices.     With the advancement of services available as well as the changing work culture allowing more people to more easily take work on the road or work from home, the use of cloud services is likely only to increase. With the help of IoT, the growth of cloud services will only increase as the quality of the internet is improving.  

Cloud Services: What Are They & What Are The Benefits? Read More »

What Does IoT Really Mean?

Internet of things (IoT) is simply a system of devices that are connected to the internet and can transfer data between them across a network without the need for human interaction. Devices can be digital devices, mechanical/digital machinery, objects, implantable medical devices, or aminal biochips. IoT can bring together the devices within closed private internet networks together and allowing them to communicate even if they are on different network types. These will include sensors, smartphones and wearables. Each device collects data from their environment and either send the data to the cloud or analyse it locally, which will enable them to act/respond. IoT can also make use of AI technology to make the data collection process more straightforward. Most of the processes will take place without the need for human intervention, but they can interact to set them up or input the instructions or access the data. IoT is still in its infancy, and some devices and networks can suffer from security issues but what it provides is a future of opportunity. Once the weaknesses can be overcome, for increased efficiency in the way things are done, so saving time and money. The benefit will reach to allow companies, governments and public authorities to reconsider how they deliver their services and produce goods. It will offer the potential to automate many more processes and reducing manufacturing and delivery costs. Some of the potential benefits of IoT in different sectors and industries include; IoT in Farming – the use of sensors to collect information on environmental factors such as; rainfall, humidity, temperature and soil content, would all go towards the automation of farming techniques. Smart home – use of smart devices to control lighting, heating, security systems will help people to use energy with increased efficiency by automating the shut off such devices while also providing convenience for consumers around their home. Medical and Healthcare IoT – will include features such as remote healthcare monitoring, emergency notification systems, smart beds. Wearables – the industry that has quickly embraced IoT and deployed it for its services is that of wearable technology. Smartwatches, virtual glasses, heart rate monitors and even glucose monitors are widely available. Smart Cities – will have IoT applications in waste management and control, traffic control, smart parking, and fleet management. Smart Retail – use of IoT by retailers to communicate directly with consumers to enhance the in-store experience and improve the design and layout based on consumer paths through the store. Currently, the issue with IoT devices is that there is no international standard for the manufacture, which means that compatibility is an issue when it comes to devices from different manufactures communicating with one another. There are also privacy concerns raised to the amount of data collected by the various devices and how that data can be used by companies for their own purposes and also potentially access by criminals. So the security of such networks is a paramount issue to be considered and applied by manufactures of the devices. Even with the weaknesses that IoT is currently showing the potential applications for the future are vast, and this technology is set to change the way we live our lives entirely.

What Does IoT Really Mean? Read More »

The Technologies That are Revolutionising Healthcare

Technological advances in the last 20 years have revolutionised the healthcare industry and have given tools to create truly amazing solutions. Below is an exploration of some of the technologies that have created the most significant impact in recent times.   3D Printing   Since the birth of 3D printing technology in 1983, we have come a long way in a relatively short time. 3D printing technology has given new and innovative solutions to many different human problems over the last ten years. The applications across many industries are endless, and the possibilities are still being realised. With just the medical 3D printing industry is s estimated that by 2027 will be worth more than $6 billion. With a vast array of applications, including; Pre-op planning – creating 3D models of organs to help surgeons plan surgeries to a higher level of accuracy, and so reducing surgery time and recovery. Prosthetics and implants – to design prosthetic limbs and implants that will be specific and the best fit for individuals. Surgical tools and instruments – they can be designed and manufactured with increased precision and even customised for surgeries. Dentistry – printing of customised dental implants can be done quickly and on-site. Bioprinting – 3D printing human tissue to make skin grafts for burn victims and eventually print organs for patients requiring transplants.   Robotics   Since the 1980’s when the first experimental surgical robots were introduced into hospitals, to the present day, that sees the potential applications for the healthcare sector continue to grow, we can see how they will not only improve what exists but even extend the services that are provided. Robots will help carry the burden of repetitive and monotonous tasks so that, staff can deal with the more critical issues and carry out the tasks that require human decision-making skills. One application of robotics in healthcare that is currently expanding, with less of the difficulties in implementation into settings, and propelled even more so with the current COVID-19 pandemic, is their use for disinfection. One way self-driving robots are being used is to disinfect patient rooms is by using UV light. Such technology is highly effective at killing viruses and bacteria without the use of chemicals, a process known as Ultraviolet Germicidal Irradiation (UVGI). Using such technology will reduce the risk for staff to come into contact with infectious viruses and bacteria. The further development of the robotic and AI technology will reveal further what roles they will play in the healthcare sector, as the roles of healthcare professionals will adapt to embrace their presence.   Wearable technology   Recent developments in wearable technology with advances in the sensors that can be incorporated has seen the potential of remote vital sign monitoring become much closer to reality. Healthcare providers would be able to monitor patients in real-time as outpatients, so saving the healthcare system millions. It would decrease the need for hospital admissions and detect vital signs abnormalities sooner, avoiding more complex health issues. The devices providing features such as heart rate, blood pressure, oxygen saturation monitoring along with side health and lifestyle patterns and chronic condition monitoring makes it possible and often better for clinicians to monitor and diagnose patients.  The potential of wearable technology becoming an aid for the medical profession is in part helped by the acceptance of wearable technologies by consumers, a survey showing that usage increased from just 9% in 2014 to 33% in 2018.   Virtual Reality and AI   Even though virtual reality (VR) is a technology generally known for entertainment and gaming industry, it has proved to have some incredibly useful applications. The healthcare industry is one of those that has adopted this technology. The use of VR in surgery simulation and skills training has proved to be an invaluable tool. It is allowing for training in a safe environment but also for skill refreshing. VR has also been used in robotic surgery, which enables the surgeon to use a robotic arm to perform surgery. With the main beneficial feature is providing force feedback allowing the surgeon to gauge the pressure required when performing delicate procedures. VR also has uses in the rehabilitation of patients, the treatment of pain, and even to help treat phobias.     The major advantage of all of these technologies and others like them is the flexibility they provide with the potential for them to be adapted to many sectors and niches of medicine. The wide range of potential applications available to both improves healthcare for the patients and the ability of healthcare professionals to provide it.

The Technologies That are Revolutionising Healthcare Read More »

What is a Data Breach and How to Prevent It

Many people are unaware of how vulnerable they are to data breaches. Anyone is at risk of experiencing a data breach from a single individual to corporations and governments. It is the person or organisation’s responsibility to protect their data. Since the introduction of GDPR, it is a legal liability for companies that carry fines up to €20 million or 4% of turnover. What is a Data Breach, and how do they occur? A data breach can be defined as a security violation in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorised to do so. The compromisation of data can have adverse effects for both the party that has had their data breached but also the people or organisations who have had their data stolen/exposed. Breaches will happen due to weakness in either the technology or user behaviour. Data breaches are not always from the outside of an organisation; it can come from inside. An accidental data breach can occur when an unauthorised person views sensitive data. Even if the data is not shared, it would still be considered a breach of data because a person saw it with no authority to do so, and this could have many repercussions. A malicious insider data breach is when sensitive data is purposely accessed by an unauthorised individual and shared/exposed with intent to cause harm to the company/organisation. Another form of a data breach is when an unencrypted and unlocked device containing sensitive data is lost/stolen. Most data breaches will come externally to the organisation and commonly by a cyberattack, which can happen by way of different methods; Phishing Brute force attack Malware How to prevent data breaches? Companies and organisations need to take the necessary steps to protect the data they hold. Protecting data of customers/clients is crucial for building trust between the company/ organisation and the customer/client. There are several practices to consider when looking to protect a company’s data from breach; Patching & updating software to help ensure any known vulnerabilities are repaired and secured. High-grade encryption on all devices to protect the sensitive data it contains should it be stolen or lost. Ensure all devices connected to the network/servers have adequate antivirus protection and business-grade VPN, including any “bring your own devices” employees have been allowed to use in any way to access company data. Use strong credentials and multi-factor authentication to protect data from being accessed by password guessing. Educating employees on the importance of data protection and potential vulnerabilities. Increasing awareness will help reduce the possibility of mistakes that can lead to data breaches. Also giving them the tools to recognise possible malicious behaviour in others. Using intruder detection on any systems that are accessible to the internet such a servers and email systems, to protect the data contained within them. Backing up to the cloud will eliminate the risk of sensitive data being stolen from backup drives and data backup tapes. Systems should be very regularly scanned and checked for vulnerabilities. Security can only be as strong as the weakest point in the system. So a regular risk assessment will minimise the risks of data breaches. Implement automated safeguards such as password checking and assess firewall configuration. Automated safeguards will aim to reduce human error, which accounts for most cases of data breaches. By following these practices, organisations and individuals can significantly reduce the chance of a data breach and in turn protect your company and personal data.

What is a Data Breach and How to Prevent It Read More »

Does your Security System Need a Refresh?

An up-to-date security system is a huge benefit to businesses. Not only will it be a deterrent to intruders but also help protect a business from potential disputes and lawsuits. However, security solutions will at some point require an upgrade, for it to remain an effective and efficient tool. Some of the reasons that you would consider an upgrade to security systems are;   Outdated technology   The development of technology systems has evolved at tremendous speed over recent times. The efficiency and performance of security equipment have improved to provide more accurate data and better data storage solutions. Poor quality images and unreliable CCTV systems no longer need to be an issue for businesses. Another problem with outdated systems is that repair and replacement parts become more costly and harder to do. Modern systems are smart and integratable, they can offer remote surveillance but also allow for smart access control for employees. Using keyless entry and restricted areas within buildings, and detailed access records is possible to install without any major modification to the building structure or fittings.   Alterations to premise Any changes to the structure of the building will render the previous security solution inadequate for the new space. The position of CCTV cameras and or any access control system will need to be adapted to the new layout to ensure that the function of the system will meet the business requirement.   Being more Eco Not necessarily the aspect that is usually linked to security systems but with the increasing global awareness of everyone doing their part and making changes to be more eco-friendly. Modern technology tends to be much more energy-efficient and so contributing towards reducing the carbon footprint. The other benefit of modern technology is the availability of a wireless solution that will reduce the amount of plastic required between devices.   If you want to get advice on your security system or are thinking of getting one installed contact Arana Security for a no-obligation chat.

Does your Security System Need a Refresh? Read More »

Moving on from Passwords

Passwords have been around in one form or another since ancient times, spoken words to allow passage. But the first time a password was used to login to a computer was in 1961, for a computer system at MIT. We have come a long way, from that first time to an age where usernames and passwords are used daily to access our information, accounts, and devices. Today we find ourselves at the next stage, the rise of biometric authentication.   The use of Biometric data as authentication. While the origins of biometric data use lay in criminal investigations, authorities used fingerprints to identify suspects of crimes. Nowadays it had become an important aspect of our daily lives. When biometrics is mentioned it does not just mean fingerprints, but it\’s also, iris scan, voice print/recognition, palm scan, brain waves, heart signals, DNA identification, and behavior biometrics. With the surge of biometric data available has led to an increase in the number of applications for its use as well as creating an industry that builds the devices to collect and solutions to store all the data securely.   Not surprisingly the first aspect that biometric technology has enhanced is security. The rise of biometric authentication has meant that the use and dependence on passwords has already started to decline. With biometrics offering a superior level of security than can be provided by passwords alone, it’s not difficult to see why. Human biometrics cannot be replicated or forgotten which offers convenience that consumers look for. Combined with industry trends that have led consumer device manufacturers investing in developing and installing biometric sensors and readers into their devices, makes the use of biometric authentication more easily accessible.   Why are we choosing Biometric data over passwords? Research has also shown that people struggle with remembering different passwords and pins. This tends to create inconvenience and delay in gaining access to accounts and in turn leading to frustration. Which can explain the research that has shown a significant number of people use the same passwords for different accounts and logins, from online banking, online retailers to social media end emails. With research showing that even today, with all the information available to consumers regarding login/account security, the number one password in use is ‘123456’. This will create convenience for the individual but will also leave them more vulnerable to fraud. If one account is compromised this increases the potential that further sensitive information can be obtained. The risks are possessed from password-stealing software, which can harvest autofill data, credit card numbers, saved passwords, and other sensitive information stored in people’s web browsers. This not only causes issues for the individual but is costing businesses and institutions time and money. It’s much more difficult to steal biometric data, which makes it a more secure option for use as proof of identity.   The finance sector has already heavily adopted the use of biometrics in a multi-level authentication for its customers, creating a more secure and easier to implement a verification system. Already the banks who have implemented the use of voice biometric verification estimate millions of pounds have been prevented from falling into the hands of criminals through banking fraud.   What does the future Hold for passwords?   It’s premature to say that passwords will disappear entirely anytime soon. What is changing is that passwords will no longer be the main authentication method. Consumers look for convenience but that has to be balanced with the need for data to be secure.  To have higher security for consumers’ accounts and data there is a need to have Multi-Factor Authentication (MFA) methods. MFA uses different forms of verification in unison with each other, for example using a pin with fingerprint verification.   The other factor of using biometric is the level of confidence that consumers have. Paysafe’s recent research shows that COVID-19 has made a significant impact on views of the security of online payments. 41% said they trusted manual passwords more than biometrics. So as business develop their online platforms it’s crucial to continue to educate and inform consumers of the benefits of biometrics.

Moving on from Passwords Read More »