Just released: How to raise venture capital in 2023

Download

A Brief Look at User Authentication Techniques

TL:DR

Key Takeaways

Carl Niedbala - Founder Shield
Carl Niedbala

Managing Partner; COO & Co-Founder

 

Almost every client we work with stores or uses some sort of Personal Identifiable Information (“PII”).  This probably reflects our apparent desire to have seamless/uber equivalents for literally every possible purchase of goods and services.  In any case, there’s a lot of personal data floating around the interwebs these days.  That should make security and user authentication techniques a priority for any tech company considering there’s roughly $560 Million in consumer internet fraud each year, some of which is recovered through class action suits against companies.  So what’s been going on in the authentication space? Here are a couple updates:

CAPTCHA

When I thought about writing this post, the first thing that came to mind was to look up stats on CAPTCHA use.  It’s sort of the ubiquitous authentication solution and its used by huge companies everywhere.  To me, CAPTCHA is synonymous with making a purchase on the Ticketmaster site, for example.

One company is working on a new technology that seems to ensure CAPTCHA is on its way out sooner than later.  San Francisco-based Vicarious is that company.  What they’re doing is taking the concept of machine learning and applying it in a more human-like fashion.  Instead of thousands of data points, their program needs only 10 to effectively learn, say, the general shape of a letter.  It’s even able to recognize shapes in picture format (i.e. the letters of a CAPTCHA).  Vicarious may or may not be the ones to eventually put machine learning on parity with that of humans, but we’re headed that way.

SMS

CAPTCHA’s been around for what seems like forever, but there are new players in the space these days.  One that’s gaining a ton of popularity is the two-factor authentication test using SMS.  For example, Facebook and Google started using this method within the last few months.If you’ve never seen this before, it works by sending you a text when you log into your account from a new location or device.  You type the code from the text into the appropriate field, and voila! You’re in.

It’s easy to understand why SMS-based authentication is gaining steam: multiple layers of authentication less a terribly intrusive or annoying user experience.  User’s don’t have to flip back and forth between their browser and email client to get the job done.  No need to leave the authentication page!

Enhance your security with this innovative approach, surpassing the traditional CAPTCHA method. However, is it truly an advancement? Employing multiple layers of authentication undoubtedly heightens security measures, yet it necessitates a sophisticated system to seamlessly process each layer. As any seasoned product professional will attest, an increase in moving parts corresponds to a higher risk of potential issues. Navigate this complexity with confidence using robust risk handling techniques.

Another potential issue with this method is that it creates the potential for multiple points of attack.  There’s now valuable information being pushed to multiple devices.  As SMS-based authentication use expands it’ll be interesting to monitor how the hacking landscape skews (if at all) towards mobile attacks.

That’s just a quick look at some of the most commonly used authentication techniques.  Regardless of what methods are used, there’s always a chance your company will be sued for data breach (whether or not it’s even your fault!).  And until some utopian society exists where these techniques and all security measures are perfected, you can take solace in the fact that you’re covered with a good cyber liability policy…

Interested in figuring out what a good cyber liability policy for you might look like? Give us a ring at 6468541058 or shoot an email to info@foundershield.com and we’ll be happy to chat!

Related Articles

cyber security tips
March 20 • Cyber Liability

Cyber Security Tips for Founders: Hackers Are Coming — Are You Ready?

Cyber threats endanger startups. Learn key cyber security tips to protect your business from financial loss, reputational damage, and legal liabilities. Implement strong defenses now.

ecommerce live social shopping 1
February 26 • Risk Management

Level Up Your E-Commerce With Live Social Shopping: A Go-To Guide

Live social shopping is changing the face of e-commerce. Discover the benefits, risks, and best practices for success in this emerging trend.

February 19 • Risk Management

Protecting Decentralized Exchanges: A Comprehensive Guide to DeFi Risk Management

This post explores emerging risks DEX companies face along with actionable tips for smart DeFi risk management, from vital insurance policies to best industry practices.

privacy regulations
January 22 • Cyber Liability

Navigating the Complex Landscape of Privacy Regulation

Explore the crucial role of data privacy in today’s digital world. Learn about key regulations like GDPR and CCPA, understand the consequences of data breaches, and discover best practices for building trust and compliance within your organization.

cyber insurance 2025
January 15 • Cyber Liability

Cyber Insurance 2025: A Review & Outlook

Explore the evolving cyber threat landscape, including AI-powered attacks, supply chain disruptions, and nation-state threats. Learn how these trends are impacting cyber insurance pricing and discover essential strategies for mitigating cyber risks and protecting your business.

AI Compliance
December 30 • Cyber Liability

How to Conduct a Thorough DPIA for AI Compliance [with GDPR]

This article outlines the key steps involved in conducting a Data Protection Impact Assessment (DPIA) for AI systems, emphasizing the importance of identifying and mitigating risks to comply with GDPR and build trust with data subjects.