Just released: How to raise venture capital in 2023

Download

A Brief Look at User Authentication Techniques

TL:DR

Key Takeaways

Carl Niedbala - Founder Shield
Carl Niedbala

Managing Partner; COO & Co-Founder

 

Almost every client we work with stores or uses some sort of Personal Identifiable Information (“PII”).  This probably reflects our apparent desire to have seamless/uber equivalents for literally every possible purchase of goods and services.  In any case, there’s a lot of personal data floating around the interwebs these days.  That should make security and user authentication techniques a priority for any tech company considering there’s roughly $560 Million in consumer internet fraud each year, some of which is recovered through class action suits against companies.  So what’s been going on in the authentication space? Here are a couple updates:

CAPTCHA

When I thought about writing this post, the first thing that came to mind was to look up stats on CAPTCHA use.  It’s sort of the ubiquitous authentication solution and its used by huge companies everywhere.  To me, CAPTCHA is synonymous with making a purchase on the Ticketmaster site, for example.

One company is working on a new technology that seems to ensure CAPTCHA is on its way out sooner than later.  San Francisco-based Vicarious is that company.  What they’re doing is taking the concept of machine learning and applying it in a more human-like fashion.  Instead of thousands of data points, their program needs only 10 to effectively learn, say, the general shape of a letter.  It’s even able to recognize shapes in picture format (i.e. the letters of a CAPTCHA).  Vicarious may or may not be the ones to eventually put machine learning on parity with that of humans, but we’re headed that way.

SMS

CAPTCHA’s been around for what seems like forever, but there are new players in the space these days.  One that’s gaining a ton of popularity is the two-factor authentication test using SMS.  For example, Facebook and Google started using this method within the last few months.If you’ve never seen this before, it works by sending you a text when you log into your account from a new location or device.  You type the code from the text into the appropriate field, and voila! You’re in.

It’s easy to understand why SMS-based authentication is gaining steam: multiple layers of authentication less a terribly intrusive or annoying user experience.  User’s don’t have to flip back and forth between their browser and email client to get the job done.  No need to leave the authentication page!

Enhance your security with this innovative approach, surpassing the traditional CAPTCHA method. However, is it truly an advancement? Employing multiple layers of authentication undoubtedly heightens security measures, yet it necessitates a sophisticated system to seamlessly process each layer. As any seasoned product professional will attest, an increase in moving parts corresponds to a higher risk of potential issues. Navigate this complexity with confidence using robust risk handling techniques.

Another potential issue with this method is that it creates the potential for multiple points of attack.  There’s now valuable information being pushed to multiple devices.  As SMS-based authentication use expands it’ll be interesting to monitor how the hacking landscape skews (if at all) towards mobile attacks.

That’s just a quick look at some of the most commonly used authentication techniques.  Regardless of what methods are used, there’s always a chance your company will be sued for data breach (whether or not it’s even your fault!).  And until some utopian society exists where these techniques and all security measures are perfected, you can take solace in the fact that you’re covered with a good cyber liability policy…

Interested in figuring out what a good cyber liability policy for you might look like? Give us a ring at 6468541058 or shoot an email to info@foundershield.com and we’ll be happy to chat!

Related Articles

data breach 2024
October 1 • Cyber Liability

Top 10 Cyber Security Data Breaches of 2024

Cybersecurity under attack in 2024! Discover the top 10 data breaches that rocked the world. Learn how major companies fell victim to cybercriminals. Understand the risks and take action to protect your business from cyber threats.

robot security manufacturing automation
September 10 • Risk Management

The Achilles’ Heel of Automation: Why Robot Security Can’t Be an Afterthought in Manufacturing

Ensuring robot security is paramount in manufacturing automation. Let’s explore the vulnerabilities, risks, and essential measures for safeguarding industrial robots from cyberattacks and operational disruptions.

supply chain disruptions
August 27 • Cyber Liability

Cyber Attacks & Supply Chain Disruptions: Startup’s Worst Enemy?

Explore the evolving threat landscape for supply chain disruptions, mitigation strategies, and the importance of risk management in today’s volatile business environment.

crypto risk management
August 20 • Risk Management

The Crypto Odyssey: A Risk Management Roadmap for Navigating the Digital Asset Frontier

Crypto market overview, risks, and opportunities. Explore the volatile world of digital currencies, including blockchain technology, regulations, and investment strategies.

cloud outage
July 17 • Risk Management

Cloud Outage Roulette: Don’t Leave Your Startup’s Success to Chance

Cloud outages are a real threat, causing lost sales and frustrated customers. This post explores how cloud outage insurance can be a lifesaver for startups, offering financial protection and peace of mind.

insurance for generative ai
July 10 • Risk Management

Safeguard Your AI: Essential Insurance for Generative Businesses

Generative AI is on the rise, but so are the risks. Standard insurance won’t cut it. Get the scoop on specialized generative AI insurance to empower innovation without fear. We cover everything from copyright clashes to data breaches, so your business can stay protected.