Just released: How to raise venture capital in 2023

Download

A Brief Look at User Authentication Techniques

TL:DR

Key Takeaways

Carl Niedbala - Founder Shield
Carl Niedbala

Managing Partner; COO & Co-Founder

 

Almost every client we work with stores or uses some sort of Personal Identifiable Information (“PII”).  This probably reflects our apparent desire to have seamless/uber equivalents for literally every possible purchase of goods and services.  In any case, there’s a lot of personal data floating around the interwebs these days.  That should make security and user authentication techniques a priority for any tech company considering there’s roughly $560 Million in consumer internet fraud each year, some of which is recovered through class action suits against companies.  So what’s been going on in the authentication space? Here are a couple updates:

CAPTCHA

When I thought about writing this post, the first thing that came to mind was to look up stats on CAPTCHA use.  It’s sort of the ubiquitous authentication solution and its used by huge companies everywhere.  To me, CAPTCHA is synonymous with making a purchase on the Ticketmaster site, for example.

One company is working on a new technology that seems to ensure CAPTCHA is on its way out sooner than later.  San Francisco-based Vicarious is that company.  What they’re doing is taking the concept of machine learning and applying it in a more human-like fashion.  Instead of thousands of data points, their program needs only 10 to effectively learn, say, the general shape of a letter.  It’s even able to recognize shapes in picture format (i.e. the letters of a CAPTCHA).  Vicarious may or may not be the ones to eventually put machine learning on parity with that of humans, but we’re headed that way.

SMS

CAPTCHA’s been around for what seems like forever, but there are new players in the space these days.  One that’s gaining a ton of popularity is the two-factor authentication test using SMS.  For example, Facebook and Google started using this method within the last few months.If you’ve never seen this before, it works by sending you a text when you log into your account from a new location or device.  You type the code from the text into the appropriate field, and voila! You’re in.

It’s easy to understand why SMS-based authentication is gaining steam: multiple layers of authentication less a terribly intrusive or annoying user experience.  User’s don’t have to flip back and forth between their browser and email client to get the job done.  No need to leave the authentication page!

Enhance your security with this innovative approach, surpassing the traditional CAPTCHA method. However, is it truly an advancement? Employing multiple layers of authentication undoubtedly heightens security measures, yet it necessitates a sophisticated system to seamlessly process each layer. As any seasoned product professional will attest, an increase in moving parts corresponds to a higher risk of potential issues. Navigate this complexity with confidence using robust risk handling techniques.

Another potential issue with this method is that it creates the potential for multiple points of attack.  There’s now valuable information being pushed to multiple devices.  As SMS-based authentication use expands it’ll be interesting to monitor how the hacking landscape skews (if at all) towards mobile attacks.

That’s just a quick look at some of the most commonly used authentication techniques.  Regardless of what methods are used, there’s always a chance your company will be sued for data breach (whether or not it’s even your fault!).  And until some utopian society exists where these techniques and all security measures are perfected, you can take solace in the fact that you’re covered with a good cyber liability policy…

Interested in figuring out what a good cyber liability policy for you might look like? Give us a ring at 6468541058 or shoot an email to info@foundershield.com and we’ll be happy to chat!

Related Articles

Cloud computing
April 16 • Risk Management

Cloud Computing Insurance Guide: How Secure Is Your Data In the Cloud?

How secure is your data in the cloud? Cloud security, compliance, and insurance: Essential strategies for cloud computing companies to mitigate risks.

crypto regulatory challenges
April 9 • Risk Management

Navigating Crypto Regulatory Challenges: Key Insights for Stakeholders

While crypto regulatory challenges require careful consideration, the funding market remains resilient. Our expertise can help you navigate these complexities.

investment risk management crypto
April 2 • Risk Management

Investment Risk Management for Crypto Companies Seeking Funding: A Guide

Crypto fundraising remains strong despite volatility, with early-stage valuations soaring. Learn about strategic risk management for crypto companies and how to navigate the evolving landscape.

cyber security tips
March 20 • Cyber Liability

Cyber Security Tips for Founders: Hackers Are Coming — Are You Ready?

Cyber threats endanger startups. Learn key cyber security tips to protect your business from financial loss, reputational damage, and legal liabilities. Implement strong defenses now.

ecommerce live social shopping 1
February 26 • Risk Management

Level Up Your E-Commerce With Live Social Shopping: A Go-To Guide

Live social shopping is changing the face of e-commerce. Discover the benefits, risks, and best practices for success in this emerging trend.

February 19 • Risk Management

Protecting Decentralized Exchanges: A Comprehensive Guide to DeFi Risk Management

This post explores emerging risks DEX companies face along with actionable tips for smart DeFi risk management, from vital insurance policies to best industry practices.